Hacking

Malvertising campaign hits 10 million users in 10 days

Security Firm Cyphort Labs reported that 10 million users may have been infected in ten days by a malvertising and…

11 years ago

Disclosed critical vulnerabilities affecting the PHP file Manager

PHP File Manager was affected by several critical vulnerabilities for nearly 5 years, according to the security consultant Sijmen Ruwhof.…

11 years ago

Experts discovered a new Google Drive phishing campaign

Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive.…

11 years ago

Darkode black market back online with security improvements

The administrator of the popular Darkode hacking forum announced that the platform will back online soon with new security improvements.…

11 years ago

Just a basic low-end mobile phone needed to hack Air-Gapped computer

Security researchers from Israel proved that hacking most secure Air-gapped computers that typically are used in sensitive work environments, is…

11 years ago

Stagefright, just a message to hack 950 Million Android devices

Android users are threatened by a new vulnerability dubbed Stagefright in the popular Google mobile OS, which allows hackers to…

11 years ago

FireEye report on TTPs of Nigerian a 419 scammers group

FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component…

11 years ago

Drone Firing Semi-Automatic Handgun, what’s next?

While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict…

11 years ago

Anonymous’s team GhostSec thwarts Isis terror plots

Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and…

11 years ago

Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in…

11 years ago

This website uses cookies.