backdoor

Bogus News mobile App discovered in Hacking Team arsenal

Experts at Trend Micro have discovered a malicious Android App while they were analyzing the package of data stolen from…

11 years ago

AlienSpy RAT exploited to deliver the popular Citadel Trojan

Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in…

11 years ago

TrueCrypt doesn’t include a backdoor according to a security audit

The security audit of the popular encryption software TrueCrypt reveals the absence of the backdoor and other significant flaws exploitable by…

11 years ago

A hacker developed Maldrone, the first malware for drones

Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack…

11 years ago

Hackers running Linux Operation Windigo are changing tactics targeting porn sites

Security Experts at ESET firm discovered that Windigo campaign is still active and that bad actors are changing their tactics…

11 years ago

MiniDuke, CosmicDuke and OnionDuke have a same matrix

Security experts collected further evidences of the link between the CosmicDuke, Miniduke and OnioDuke Advanced Persistent Threat campaigns. Researchers at F-Secure…

11 years ago

Sucuri firm discovered Backdoors relying on the Pastebin Service

The popular copy and paste website Pastebin has been leveraged by hackers to serve a backdoor to millions of users…

11 years ago

USBdriveby, how to compromise a PC with a $20 microcontroller

USBdriveby is a device designed to quickly and covertly install a backdoor and override DNS settings on an unlocked machine…

11 years ago

CoolReaper, a Backdoor in million Coolpad Android devices

Palo Alto Networks discovered that the software installed on many of Coolpad high-end Android phones includes a CoolReaper backdoor. The…

11 years ago

APT ported XSLCmd Backdoor on OS X according to FireEye

Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks…

11 years ago

This website uses cookies.