A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing…
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group.…
Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC…
The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army's commercial content delivery…
TrapX, a renowned security providing delivery of deception based cybersecurity defense uncovered a security flaw in medical field dubbed as medical device hijack,…
The owner of the Tox ransomware builder is offering for sale the platform worried by its popularity. He confirmed that…
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We…
A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent…
The silent war between black markets in the deep web, Mr Nice Guy hired a blackmailer to hit TheRealDeal and…
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…
This website uses cookies.