Hacking

Mobile Ad Network exploited to run a major DDoS Attack

Security experts at CloudFlare observed a major DDoS attack against one of their customers that appeared to leverage a mobile…

10 years ago

How to use GCAT backdoor with Gmail as a C&C server

The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control…

10 years ago

Tracking Hacker Forums with Traffic Analysis

A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like…

10 years ago

The recent iOS 9.0.1 Update fails to fix the Lock screen Bypass flaw

Apple recently released its first update to the new iOS 9, but experts noticed that it doesn't fix the lock…

10 years ago

The US military is still sending un-encrypted emails

The MotherBoard news website recently published an interesting analysis on how the US Military Fails to Protect its Soldiers' Emails,…

10 years ago

Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their…

10 years ago

Access Private Photos and Contacts Without a Passcode on iOS 9 devices

A hacker has found a way to access images and contacts stored on Apple iOS 9 devices even if they…

10 years ago

Find a zero-day exploit to hack IOS 9 and win a $1m prize

Zerodium is an Exploit trader and it's offering a million dollar prize to any person that finds zero-day flaws in…

10 years ago

New updates on Cyber Conflict Agenda 2016 and what’s new in ‘Cyber power’

The 8th International Conference on Cyber Conflict (CyCon 2016) will be held in Tallinn, Estonia from 31st of May to…

10 years ago

3 flaws in StarBucks websites open its users to attacks

The Egyptian security researcher Mohamed M. Fouad has spotted three critical vulnerabilities in the StarBucks website that open users to…

10 years ago

This website uses cookies.