The GM Bot v2 released after source leak, it is more expensive of v2

10 years ago

After the source code of the Android banking Trojan GM Bot was leaked online, the new version GM Bot v2…

The DoJ threatens to force Apple to hand over iOS source code

10 years ago

DOJ released a brief filing that threatens to force Apple to hand over the iOS source code if it will…

Placing a skimmer on Gas Station Card Scanner in less than 3 seconds

10 years ago

Attack ATM is very simple for criminals, a video released by Miami Beach Police shows two men installing a credit…

Hacking mechanic’s workshop to infect cars

10 years ago

Hacking mechanic's workshop to infect cars, this is the concept behind a new attack technique devised by the hacker Craig…

The leader of the Team GhostShell collective revealed his identity

10 years ago

G.Razvan Eugen is a 24 year-old Romanian that claims to be the founder of the collective Team GhostShell that hacked…

CVE-2013-5838 Java flaw is back two-year later due to broken patch

10 years ago

The patch for the critical Java CVE-2013-5838 vulnerability released by Oracle in 2013 is ineffective and can be easily bypassed.…

Reuters – Malware suspected in the Bangladesh central bank heist

10 years ago

Investigators suspect the attackers behind the Bangladesh central bank 's hack have used a malware to gather information for the…

Security Affairs newsletter Round 51 – News of the week

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Anonymous hacked…

CISCO warns customers of high-severity flaws in modems and gateways

10 years ago

Cisco released a series of software updates to patch several high severity flaws in its cable modems, residential gateways and…

A new massive spam campaign is spreading Locky ransomware downloaders

10 years ago

Experts at Trustwave observed a new massive spam campaign that was sending a JavaScript attachment that downloads Locky ransomware. Ransomware…

This website uses cookies.