Hacking

Hacking Apple devices with just a Message exploiting the CVE-2016-4631

This critical flaw CVE-2016-4631 resides in the ImageIO and could be exploited by a remote attacker to steal sensitive information…

9 years ago

Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities…

9 years ago

Baby monitors still open to hackers across the UK, warns the ICO

According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of…

9 years ago

cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features.…

9 years ago

Abusing Two-factor authentication to steal money from Instagram, Google and Microsoft

A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to…

9 years ago

SFG malware was not designed to target SCADA systems in the energy industry

Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in…

9 years ago

Hacker is offering for sale a complete US Voters archive

Colleagues at HackRead discovered a seller using the pseudonym of 'DataDirect' offering US voters' registration records on a black marketplace.…

9 years ago

Hacker Interviews – Zeus Anon

Enjoy the interview with Zeus Anon to understand which phenomena are influencing the cyberspace and how hackers are fighting the…

9 years ago

Data breaches in the healthcare sector are fueling the dark web

Data breaches in the healthcare sector are fueling the dark web, millions of people's medical records are offered for sale…

9 years ago

OpenSSH is affected by a user enumeration bug

The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check…

9 years ago

This website uses cookies.