CVE-2016-4171 – Another Flash Zero-Day exploited in targeted attacks

10 years ago

Adobe states that the Flash Player zero-day vulnerability (CVE-2016-4171) has been exploited in targeted attacks. It will be fixed later…

Hack the Pentagon, hackers already found more than 100 flaws

10 years ago

Hackers contracted by the DoD under the Hack the Pentagon initiative have found more than 100 vulnerabilities exceeding Government's expectations.…

Watch out, FLocker Ransomware targets Android smart TVs

10 years ago

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware…

Crooks can clone payments cards with a hi-tech contactless device

10 years ago

Cyber criminals are offering for sale a hi-tech gadget named Contactless Infusion X5t to scan nearby contactless payment cards and…

Hackers find a way to send massive messages on Telegram

10 years ago

Security researchers have found a vulnerability that could allow attackers to send massive messages on Telegram bypassing its limitations. Security…

‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

10 years ago

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the…

North Korean Hackers stole defense documents and photos from South

10 years ago

The Government of Seoul reported that North Korean Hackers stole defense-related documents and photos from two South Korean companies. The…

Singapore will isolate Government Computers from the Internet

10 years ago

The Government of Singapore will cut off civil servants' work computers from the Internet in order to secure Government networks.…

Exclusive: Critical vulnerability found on Twitter?

10 years ago

The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter…

The NSA wants to exploit IoT devices for surveillance and sabotage

10 years ago

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

This website uses cookies.