Hacking

How to restore files encrypted by the Petya ransomware in less than 7 seconds

Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated…

10 years ago

Bug Bounty Program is becoming more popular in Japan

Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to…

10 years ago

Researchers devised a reCaptcha breaking system effective against Google and Facebook

A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The…

10 years ago

More than 135 million ARRIS cable modems vulnerable to remote attacks

Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135…

10 years ago

How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to…

10 years ago

Homeland Security – US Consular Consolidated Database vulnerable to cyber attacks

According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD)  database is open…

10 years ago

Flaw in CISCO FirePower Firewall allows malware evade detection

A flaw in the family of CISCO FirePower Firewall devices allows malware to bypass detection mechanism. Cisco is releasing security…

10 years ago

DB with records of 50 Million Turkish Citizens Leaked Online. Are they recycled data?

A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a…

10 years ago

German intelligence Agency BND spied on Netanyahu

The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to…

10 years ago

Hacking connected lightbulbs to breach Air-Gapped networks

Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…

10 years ago

This website uses cookies.