Hacking

Hacking home networks by compromising a Nest thermostat

A group of researchers  from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already…

11 years ago

Babar and Casper, two Malware likely designed by the French Intelligence

After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the…

11 years ago

How to serve malware by exploiting Blu-ray disc attacks

A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the…

11 years ago

Seagate NAS affected by a Remote Code Execution zero-day vulnerability

 A security expert discovered a Remote Code Execution zero-day vulnerability in Seagate Network Attached Storage (NAS) systems. A critical zero-day…

11 years ago

The transportation giant Uber discloses a Data Breach

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly…

11 years ago

Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks…

11 years ago

SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive…

11 years ago

More than 1 Million WordPress websites are vulnerable to blind SQL Injection Attacks

A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use…

11 years ago

NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The…

11 years ago

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

11 years ago

This website uses cookies.