Hacking

Distributed Guessing Attack to hack VISA cards in just six seconds

A group of security researchers discovered a new method dubbed Distributed Guessing Attack to hack VISA credit card in just…

9 years ago

50 Million installations potentially impacted by AirDroid issues

At least 10 million Android users are exposed to cyber attacks due to multiple vulnerabilities affecting the popular AirDroid app.…

9 years ago

Kapustkiy hacked a website belonging to the Venezuela Army

The hacker Kapustkiy has breached the Venezuela Army and leaked 3000 user records containing personal information such as names, emails,…

9 years ago

What Happens if you plug a USBKill in a gaming console or a car?

Ill-intentioned could destroy everything using the USBKill device, including gaming console, mobile devices, Google Pixel and also circuits in modern…

9 years ago

A flaw allows to bypass the activation lock on iPhone and iPad

Researchers discovered a bug that can be exploited to bypass Apple’s Activation Lock feature and gain access to the homescreen…

9 years ago

The Immaterial Khilafah – Global Intelligence Insight Report

As the coalition forces started to enter the Iraqi city of Mosul, many have seen Al-Baghdadi’s speech as desperate plea,…

9 years ago

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month.…

9 years ago

More than 1 Million Google accounts hacked by Gooligan Android Malware

Experts from the security firm CheckPoint discovered a new Android malware dubbed Gooligan that has already compromised more than a…

9 years ago

Thousands of UK National Lottery player accounts compromised

Roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals, authorities are investigating the case. According to…

9 years ago

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

9 years ago

This website uses cookies.