Hackers that breached Oracle MICROS systems have infected systems of other five PoS vendors that supply hundreds of thousands of…
Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against…
Bitfinex exchange is willing to offer 5% of the lost funds (nearly 6,000 BTC) as a reward for the recovery…
Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last…
A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…
Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are…
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows…
This website uses cookies.