Hacking

How to Exploit Belkin WEMO gear to hack Android devices

Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL…

9 years ago

Watch out! A new LinkedIn Phishing campaign is spreading in the wild

Experts from Heimdal Security reported a recent LinkedIn phishing campaign aiming to collect confidential information from unsuspecting users. Phishing attacks…

9 years ago

Commercial Exaspy spyware used to target high-level executives

Security researchers at Skycure have discovered a new commodity Android Spyware, dubbed Exaspy, targeting high-level executives. While in many countries…

9 years ago

The US Government is ready to hack back if Russia tries to hit Presidential Election

Documents and testimonials collected by the NBC news confirm US Government cyber army is ready to hack back if Russia…

9 years ago

How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems…

9 years ago

Malware used to spy Iran’s nuclear negotiations in the Geneve’s venue

Switzerland’s attorney general has confirmed to have investigated the presence of spyware in a venue that also hosted talks on…

9 years ago

Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?

Mirai botnet was used to power a massive DDoS attack against Liberia causing the Internet outage in the entire country…

9 years ago

ISIS Is Watching you: Islamic State Hacking Team Shares Access to Security Cameras Around the Word

BLACKOPS Cyber (BOC) reported to the authorities that a well-known ISIS hacking team was sharing access links to widely used…

9 years ago

Critical DOM XSS flaw on Wix.com put million websites at risk

A DOM-based cross-site scripting vulnerability in the cloud-based development platform Wix.com put million websites at risk. The cloud-based development platform…

9 years ago

Critical MySQL flaws can allow attackers to hack into your server

The security expert Dawid Golunski disclosed critical vulnerabilities in MySQL, MariaDB and PerconaDB can lead fully compromise of servers. Critical…

9 years ago

This website uses cookies.