Hacking

Apple iOS flaw exploitable to steal user password with a phishing email

A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing…

11 years ago

Belgian authorities detained terrorists by intercepting WhatsApp messages

Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group.…

11 years ago

NFC attack can steal your credit card information

Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC…

11 years ago

SEA – Syrian Electronic Army defaced the US Army website

The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army's commercial content delivery…

11 years ago

MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack,…

11 years ago

Tox ransomware platform builder is now available for sale

The owner of the Tox ransomware builder is offering for sale the platform worried by its popularity. He confirmed that…

11 years ago

PunkSPIDER, the crawler that scanned the Dark Web

Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We…

11 years ago

A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent…

11 years ago

The silent war between black markets in the deep web

The silent war between black markets in the deep web, Mr Nice Guy hired a blackmailer to hit TheRealDeal and…

11 years ago

A report shows that the NSA is in a search for hackers

The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…

11 years ago

This website uses cookies.