Hacking

Tens of thousands of DVRs exposed on Internet with Hardcoded Passwords

According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the…

10 years ago

A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…

10 years ago

VXE Flaw allowed threats to bypass FireEye detection engine

Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker…

10 years ago

Researcher hacks medical devices and the whole hospital with ease

Sergey Lozhkin, a security expert at Kaspersky Lab demonstratd how it is easy for hackers to compromise medical devices and…

10 years ago

GCHQ helped US in developing Stuxnet, claims a documentary

A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…

10 years ago

Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal

Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…

10 years ago

US Judge requests Apple to unlock San Bernardino shooter’s iPhone

A US magistrate ordered Apple to help unlock San Bernardino shooter's iPhone, be aware it is demanding a tool to…

10 years ago

$103,000 stolen in Brain Wallets cracking attacks

A group of researchers discovered that roughly 1,000 brain wallets have been drained by cyber criminals that have stolen $103,000…

10 years ago

APT Groups don’t go under the grid after a successful attack!

What happened to some of the APT groups behind clamorous cyber attacks? Why they don't go dark anymore after being…

10 years ago

A flaw in CISCO Universal Small Cell allows firmware retrieval

A flaw affecting the Cisco Universal Small Cell devices allows unauthenticated remote users to retrieve devices' firmware, so Cisco urges…

10 years ago

This website uses cookies.