Hacking

A report shows that the NSA is in a search for hackers

The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…

11 years ago

Hacking Apple Pay to steal credit card data

Experts at Wandera discovered that hackers can set up a bogus access point spoofing Apple Pay and fool users into…

11 years ago

How to easily hack a WhatsApp Account?

TheHackerNews has reported a simple trick that allows to hijack a WhatsApp account easily on every mobile platform by knowing…

11 years ago

Are Russian hackers behind the Bundestag cyber attack?

Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale…

11 years ago

APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope…

11 years ago

Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using…

11 years ago

Torus, a milestone in massive surveillance

"Torus" a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes…

11 years ago

Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…

11 years ago

Mac zero-day makes rootkit infection very easy

A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI…

11 years ago

Google blocks Chrome extensions out of the official Store

The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…

11 years ago

This website uses cookies.