Hacking

DARPA ASOM technology identifies counterfeit microelectronics

DARPA announced the deployment of the ASOM technology which will be used to inspect critical equipment to detect counterfeit microelectronics.…

11 years ago

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion,…

11 years ago

A mobile spyware used to track activists in Honk Kong

A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest…

11 years ago

iFrame-based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve…

11 years ago

ShellShock could be used to hack VoIP systems

Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be  exploited to hack Voice over IP systems worldwide. The…

11 years ago

The majority Mac users safe from Bash Bug while Oracle warns its customers

Apple says users of its OS X are "safe by default" from the Bash Bug, meanwhile Oracle warns its customers…

11 years ago

The Fappening 3, other nude celebrity photos leaked

A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence…

11 years ago

NSA spies on UN in Vienna – The Leaked photos

The journalist Erich Möchel leaked photos reported alleged NSA monitoring stations in Vienna which are used by the Intelligence to…

11 years ago

Hackers target Bash Bug vulnerability in the wild

The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of…

11 years ago

Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is…

11 years ago

This website uses cookies.