US DoD invites a restricted number of hackers to Hack the Pentagon

10 years ago

Hack the Pentagon - DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources…

DarkHotel hackers are back targeting Chinese Telecom

10 years ago

The DarkHotel APT group is back and it is targeting executives at telecommunications companies in China and North Korea. According…

Brazilian police arrested Facebook Vice President for Latin America

10 years ago

Brazilian authorities arrested the Facebook Vice President for Latin America accused of ignoring judicial order in drug trafficking investigation. Law…

33 percent of all HTTPS websites open to DROWN attack

10 years ago

Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered…

Waiting for a court ruling, a New York Judge rejected FBI request to unlock an iPhone

10 years ago

The federal magistrate Judge James Orenstein has ruled in favor of Apple, rejecting the FBI request to unlock an iPhone.…

Two Years to General Data Protection Regulation Compliance

10 years ago

The General Data Protection Regulation (GDPR) governs the use and privacy of EU citizens’ data and the Data Protection Directive…

New HackingTeam OS X RCS spyware in the wild, who is behind the threat?

10 years ago

A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it?…

European police corps arrested operators behind darknets offering illegal products and services

10 years ago

A coordinated operation of law enforcement agencies in 7 countries raided operators of darknets trading in illegal products and services.…

Raspberry Pi 3 Model B, a $35 MicroComputer is arrived

10 years ago

The Raspberry Pi 3 model B comes with significant improvements and it is now available for sale for $35, the same price…

Using the Microsoft EMET security tool to hack itself

10 years ago

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…

This website uses cookies.