Upgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDF

10 years ago

Viewing a maliciously crafted JPEG may lead to arbitrary code execution, a boobytrapped JPEG could compromise your iPhone. Upgrade to…

Kaspersky Lab launched the new Lab ICS-CERT

10 years ago

Kaspersky Lab has launched a new global computer emergency response team (CERT), the Kaspersky Lab ICS-CERT, focusing on industrial control…

Millions of Android smartphones exposed to new Drammer Android attack

10 years ago

A new method of attack dubbed DRAMMER could be exploited to gain 'root' access to millions of Android smartphones and…

Hacking GSM A5 crypto algorithm by using commodity hardware

10 years ago

Researchers demonstrated how to crack GSM A5/1 Stream Cipher using a general-purpose graphics processing unit computer with 3 NVIDIA GeForce…

Discovery of Weapons Cache Reignites Fears ISIS Will Use Chemical Weapons in Battle for Mosul

10 years ago

The battle in Mosul of the international coalition against the ISIS is expected to become the largest battle fought in…

The German parliament passes controversial a surveillance law

10 years ago

The German Parliament passed a controversial surveillance law that seems to give more power to the BND intelligence agency. The…

24 hours in the life of my home router by Francisco J. Rodriguez

10 years ago

Recently a massive DDoS attack has disconnected a large portion of users from the Internet, hackers exploited IoT devices. Is your…

Hackers offered an loT botnet for $7,500. The recent attack may be just a test

10 years ago

The security firm RSA revealed to have discovered in early October, hackers advertising access to a huge IoT botnet on…

Terrorism activity continues unabated – Tower of Babel under the surface

10 years ago

This increase of the activity led Intel experts at Global Intelligence Insight to raise the level of terrorism threat in…

InTheCyber discovered a serious flaw in messaging systems

10 years ago

Researchers at InTheCyber firm have discovered a new easy exploitable and dangerous vulnerability affecting messaging systems. InTheCyber – Intelligence &…

This website uses cookies.