Hacking

48,000 Windows XP PCs are still running at TEPCO … which are the risks?

Which is the impact of the Windows XP End of Life on the critical infrastructure? Recently a Government audit found…

11 years ago

Magento Flaw Exploited in the Wild a few hours after disclosure

Sucuri revealed that cyber criminals are attempting to hijack online shops based on Magento platform by exploiting a recently disclosed…

11 years ago

SSL certificate parsing vulnerability could force iOS devices into endless reboot loop

Israeli security researchers have discovered a SSL certificate parsing vulnerability affecting iOS devices that could force them into endless reboot loop. Yair Amit and…

11 years ago

How to discover NSA Quantum Insert attacks on your systems

Security experts at Fox-IT have developed a method for detecting NSA Quantum Insert attacks and have published an interesting post…

11 years ago

Wi-Fi SSID names could allow to crash or hack mobile devices

Security researchers discovered a bug in WiFi SSID management that could be exploited by hackers to crash Android, Windows, Linux…

11 years ago

How to hack Avaya phones with a simple text editor

At RSA conference 2015 a researcher demonstrated that Avaya's Ethernet office phones can be compromised with just a simple text…

11 years ago

Spy in the sandbox attack to spy on your online activity

Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy…

11 years ago

The hacker Stefan Esser shows the jailbreak for iOS 8.4 beta 1

The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta…

11 years ago

Smart city systems could become a nightmare for security

Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of…

11 years ago

How to use a malicious JPEG to hack corporate networks

Security researcher Marcus Murray discovered a method to exploit a malicious JPEG to compromise modern Windows servers inside corporate networks.…

11 years ago

This website uses cookies.