Hacking

#infosec16 SecurityAffairs awarded as Best European Personal Security Blog

At the fifth annual European Security Blogger Awards at Infosecurity Europe in London SecurityAffairs was awarded as Best European Personal…

10 years ago

32 Million Twitter account credentials offered for sale

A hacker is offering for sale more than 32 million Twitter account credentials with plans to sell the account details…

10 years ago

A crafted PDF document can hack your Chrome PDF reader, Update Chrome now!

A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow…

10 years ago

China ready to launch the first hack proof quantum communication satellite

China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications.…

10 years ago

Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case…

10 years ago

It’s official, μTorrent Forum Hacked!

The μTorrent team announced its community μTorrent forum has been hacked. Hundreds of thousand records belonging its users have been…

10 years ago

Facebook fixed a flaw in the Messenger App.Doubts on its severity

Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the…

10 years ago

Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET…

10 years ago

Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs

Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by…

10 years ago

Charging Mobile Devices could be very risky according to Kaspersky

Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging…

10 years ago

This website uses cookies.