NSA compromised systems in North Korea with a Malware

9 years ago

The NSA has been targeting North Korea and its impenetrable system for a long time. Thanks to the new revelations…

Dotcom launches MegaChat for end-to-end encrypted audio and video communications

9 years ago

The entrepreneur Kim Dotcom has launched MegaChat, a new feature on Mega.nz that allows end-to-end encrypted audio and video communications.…

Schneider Electric SCADA Gateway contains Hard-Coded FTP Credentials

9 years ago

Narendra Shinde of Qualys Security has identified multiple vulnerabilities in Schneider Electric’s ETG3000 FactoryCast HMI Gateway. ICS-SCADA systems are critical…

Snowden doesn’t use iPhone for security reasons

9 years ago

The Snowden's lawyer has recently declared that the popular whistleblower doesn't use iPhone due to the alleged presence of a…

New Angler exploit kit includes a Flash zero-Day

9 years ago

The French security expert Kafeine has discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit…

Ubuntu patched several security vulnerabilities

9 years ago

Ubuntu has released several patches for security vulnerabilities in different versions of the OS, including some CSRF, DoS and remote…

TURNIPSCHOOL – DIY NSA spying technology from the NSA Tao catalog

9 years ago

Researchers have presented the TURNIPSCHOOL project and other activities that replicate NSA surveillance implants with cheaper and off the shelf…

PlugX RAT compromised official releases of popular games in Asia

9 years ago

Hacks in Taiwan security conference has uncovered a malware-based attack involving several online games to spread the PlugX RAT. Experts…

GoDaddy fixed a CSRF flaw that allows Domain takeover

9 years ago

A security expert discovered a cross-site request forgery (CSRF) flaw to take over domains registered with GoDaddy, the company has…

Car hacking – Progressive Dongle exposes vehicles to attacks

9 years ago

A security researcher demonstrated that "car hacking" is reality through the exploitation of vulnerable Can Insurance Dongle. Million vehicles at…

This website uses cookies.