Hacking

Hackers target Facebook users exploiting Same Origin Policy vulnerability

Security Experts at Trend Micro discovered a series of hacking attacks targeting Facebook users and exploiting the Same Origin Policy…

11 years ago

At the Chaos Computer Club an expert showed hot to bypass Fingerprint biometrics with a few photographs

A security expert at the conference of the Chaos Computer Club has shown how to bypass Fingerprint biometrics using only…

11 years ago

Until 2012 the Intelligence failed to decrypt Tor network

A new collection of documents leaked by Snowden and disclosed by the Der Spiegel reveals the difficulties of Intelligence agencies…

11 years ago

Cybercriminals are exploiting the incident of the AirAsia flight QZ8501

Security experts have collected evidence that cyber criminals are exploiting the incident of the flight QZ8501 for illicit activities. Cybercriminals…

11 years ago

Lizard Squad reveals itself. What to learn from the attack?

Sky News has interviewed one of the members of Lizard Squad that explained the motivation of the recent cyber attacks.…

11 years ago

Alleged Anonymous members leaked 13000 credentials for popular websites

A group of hackers claiming to be members of the collective Anonymous has released online a lot of 13,000 passwords…

11 years ago

Lizard Squad hit the Tor network, after Christmas attacks on Sony PSN and XBox Live networks

Members of the hacking group Lizard Squad, which have paralyzed the networks of Xbox live and PlayStation PSN, now have…

11 years ago

Lizard Squad took down again Sony PSN and Xbox Live networks

Hackers belonging to the Lizard Squad team have taken down at Christmas the online networks of both Microsoft Xbox Live…

11 years ago

Afghanistan CDN network compromised by Chinese hackers

Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country. The…

11 years ago

Cybercrime-as-a-Service, a winning model of sale

Security Experts at Sophos explained the efficiency of the business model known as Cybercrime-as-a-Service in the specific case of Vawtrak…

11 years ago

This website uses cookies.