Millions of Xiaomi Smartphone vulnerable to remote hacking

9 years ago

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

CVE-2016-3238 Windows flaw allows to hack companies via printers

9 years ago

Microsoft has just fixed a the CVE-2016-3238 Print Spooler vulnerability that allows attackers to hack any version of Microsoft Windows.…

Tor and Linux Users Are Extremists? The NSA Thinks So

9 years ago

The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen…

Hacker Interviews – Chema Alonso

9 years ago

Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber…

Experts found a government malware on the Dark Web

9 years ago

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

How to defeat every ransomware with Crypto Drop

9 years ago

A group of American boffins have devised a system dubbed Crypto Drop that working with a “save what you can”…

Hacker Interviews – John McAfee, the legend

9 years ago

Dear readers, I'm really proud and excited to share with you my interview with a legend Mr John McAfee. John…

Is your iOS device hostage? Old scam scheme used to lock mobile

9 years ago

A number of iOS devices are being held ransom by the Russian “Oleg Pliss” who is demanding a payment of $100…

NATO on Cyber Defence : Time Level Up

9 years ago

NATO on Cyber Defence - The cyberspace has become the new battlefield and an ingreasing number of threats leverages on…

JIGSAW ransomware defeated once again, decrypt your files for free

9 years ago

If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from…

This website uses cookies.