Hacking

Torus, a milestone in massive surveillance

"Torus" a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes…

10 years ago

Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…

10 years ago

Mac zero-day makes rootkit infection very easy

A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI…

10 years ago

Google blocks Chrome extensions out of the official Store

The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…

10 years ago

US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…

10 years ago

How to hack a Parking Management System and why?

The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always…

10 years ago

The Importance of Operational Security and User Education

An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and…

10 years ago

Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks

Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…

10 years ago

US failed a Stuxnet-style attack against North Korea

New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could…

10 years ago

Stegosploit hides malicious code in images, this is the future of online attacks

Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…

10 years ago

This website uses cookies.