China

Root access backdoor discovered in Chinese Tenda Wireless RoutersRoot access backdoor discovered in Chinese Tenda Wireless Routers

Root access backdoor discovered in Chinese Tenda Wireless Routers

Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer…

12 years ago
Profession Hacker, it’s shortage for cyber expertsProfession Hacker, it’s shortage for cyber experts

Profession Hacker, it’s shortage for cyber experts

Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It's…

12 years ago
How NSA tries to compromise Tor anonymity. Tor Stinks documentHow NSA tries to compromise Tor anonymity. Tor Stinks document

How NSA tries to compromise Tor anonymity. Tor Stinks document

Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity…

12 years ago
FireEye World War C report – Nation-state driven cyber attacksFireEye World War C report – Nation-state driven cyber attacks

FireEye World War C report – Nation-state driven cyber attacks

FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven…

12 years ago
Iran hacked US Navy ComputersIran hacked US Navy Computers

Iran hacked US Navy Computers

US officials revealed that Iran hacked unclassified Navy computers in recent weeks in an escalation of cyber attacks against US infrastructures. The…

12 years ago
Beware Apple iMessage app for Android, it is a dangerous fakeBeware Apple iMessage app for Android, it is a dangerous fake

Beware Apple iMessage app for Android, it is a dangerous fake

A fake Apple iMessage app for Android OS has been published on official Google Play app store for around one…

12 years ago
Chinese hackers increasingly attracted to the drone technologyChinese hackers increasingly attracted to the drone technology

Chinese hackers increasingly attracted to the drone technology

Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before!…

12 years ago
China hit by DDoS attack. The Internet inaccessible for hoursChina hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the…

12 years ago
Chinese hackers that hit NYT are evolving their techniquesChinese hackers that hit NYT are evolving their techniques

Chinese hackers that hit NYT are evolving their techniques

FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012,…

12 years ago
Spy agencies ban on Lenovo PCs due to backdoor vulnerabilitiesSpy agencies ban on Lenovo PCs due to backdoor vulnerabilities

Spy agencies ban on Lenovo PCs due to backdoor vulnerabilities

Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to…

12 years ago