A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence and other celebrities. The Fappening is now in its third episode and the celebrities are naked again. The Fappening seems to be never ending story, a new archive of nude celebrity photos has been leaked online. The […]
The journalist Erich Möchel leaked photos reported alleged NSA monitoring stations in Vienna which are used by the Intelligence to spy on UN. Photos published by the journalist Erich Möchel in a blog post seems to confirm the presence of an NSA surveillance infrastructure, mentioned in the Snowden’s leaked documents “Vienna Annex”, in the attics of IZD Towers […]
The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of machines on a large scale. The recently discovered Bash Bug vulnerability, coded as CVE-2014-6271 and known also as “Shellshock,” is worrying the security community due to its impact on a large-scale. The remotely exploitable critical flaw affects Linux, Unix and […]
Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in Linux and Unix command-line shell, aka the GNU Bourne Again Shell, is threatening the IT world. The flaw, coded as CVE-2014-6271, is remotely exploitable and affects Linux […]
Users which havenât upgraded their systems to the Apple iOS 8 could be victims of a new iOS 7.1 exploit targeting the CVE-2014-4377 vulnerability. Security experts at Binamuse firm have discovered the availability online of the exploit kit which targets the vulnerability coded CVE-2014-4377, a memory corruption issue in iOSâs core graphics library. The exploitation of CVE-2014-4377 could […]
THN disclosed details of a critical flaw discovered by the Egyptian researcher âYasser H. Aliâ four months ago, which could be used to hack any eBay account. The Egyptian security researcher âYasser H. Aliâ four months ago reported to the team of the The Hacker News portal a critical vulnerability in eBay system which could be used by […]
Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal characteristics of the app are its injection and hooking techniques used to spy on mobile users. The techniques are rare […]
Another cache of nude photos and videos of celebrities was disclosed online, investigators believe that this wave is linked to the first Fappening archive. During the last weeks media have focused their attention on the celebrity iCloud hacking case, hundreds of naked pictures are available online raising the interest to the level of security offered by cloud […]
DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice (DoJ) is declaring war to online anonymity, its proposal to amend Rule 41 of the Federal […]
Egyptian bug hunter discovered that Avira Website is affected by CSRF flaw that allows attackers to hijack usersâ accounts and access to their online backup. What do you think about if tell you that an antivirus could represent a menace for your system? Antivirus like any other kind of software could be exploited by threat […]