Hacking

The US military is still sending un-encrypted emails

The MotherBoard news website recently published an interesting analysis on how the US Military Fails to Protect its Soldiers' Emails,…

10 years ago

Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their…

10 years ago

Access Private Photos and Contacts Without a Passcode on iOS 9 devices

A hacker has found a way to access images and contacts stored on Apple iOS 9 devices even if they…

10 years ago

Find a zero-day exploit to hack IOS 9 and win a $1m prize

Zerodium is an Exploit trader and it's offering a million dollar prize to any person that finds zero-day flaws in…

10 years ago

New updates on Cyber Conflict Agenda 2016 and what’s new in ‘Cyber power’

The 8th International Conference on Cyber Conflict (CyCon 2016) will be held in Tallinn, Estonia from 31st of May to…

10 years ago

3 flaws in StarBucks websites open its users to attacks

The Egyptian security researcher Mohamed M. Fouad has spotted three critical vulnerabilities in the StarBucks website that open users to…

10 years ago

A string could be used to crash Google Chrome

It seems incredible, but as already happened for Skype it is possible to crash the latest version of Google Chrome…

10 years ago

Discovered a Reflected Filename Download flaw in LinkedIn

The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He…

10 years ago

D-Link firmware accidentally includes Code Signing Keys

The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of…

10 years ago

w0rm hackers hacked another hacking crew

The popular group of hackers dubbed w0rm breached the hacking forum "Monopoly" offering for sale all data present in its…

10 years ago

This website uses cookies.