Hacking

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants' work computers from the Internet in order to secure Government networks.…

10 years ago

Exclusive: Critical vulnerability found on Twitter?

The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter…

10 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

10 years ago

How to bypass two-factor authentication with a text message

Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your…

10 years ago

Bolek Banking Trojan, a Carberp Successor is spreading in the wild

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit…

10 years ago

More Fallout from the LinkedIn Breach in new Targeted Attacks on Banking

CERT-Bund released a warning that corporate executives may be being targeted with malicious emails using data from the LinkedIn data…

10 years ago

Twitter resets account login credentials for exposed accounts

Twitter investigated account login credentials recently offered for sale on the dark web, locked the accounts and reset their passwords.…

10 years ago

Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world's largest malicious architecture, used to spread the dreaded threats appears to have vanished…

10 years ago

European Union Websites plagued by SQL Injection Flaws

Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites…

10 years ago

Are you using EMC and VMware solutions? Watch out unauthorized accesses!

EMC Data Domain OS and VMware NSX and vRealize are affected by security issues that could be exploited to gain…

10 years ago

This website uses cookies.