Hacking

Surveillance – How to secretly track cellphone users position around the globe

Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements…

11 years ago

Android Same Origin Policy flaw affects more than 70% devices

A serious flaw vulnerability has been discovered in the default browser on a large number of Android devices that allows…

11 years ago

WikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most "abusive"…

11 years ago

A critical flaw in Twitter allows to delete payment cards from any account

An Egyptian security researcher has discovered a critical flaw in Twitter platform which allows an attacker to delete credit cards…

11 years ago

ISIS is ramping up efforts to mount a massive cyber attack

Extremists groups of ISIS and Al Qaeda are ramping up efforts to launch major cyber attacks on Western Critical Infrastructure…

11 years ago

DNS cache poisoning attacks to steal emails are reality

CERT warns that DNS Cache Poisoning attacks could be used also to hijack email to a rogue server and not…

11 years ago

A Brazilian newspaper site used in server malware to change Router DNS Settings

A Brazilian newspaper's website has been hacked to serve a malware that tries to change the victim’s router DNS settings…

11 years ago

FireEye uncovered two cyber espionage campaigns operating in parallel from China

FireEye discovered two distinct groups of Chinese hackers operating cyber espionage campaigns on a large-scale in parallel. Security experts at FireEye…

11 years ago

Nearly 5 million alleged Google account credentials leaked

A database containing nearly million login and passwords for Google accounts has been leaked online on a Russian cyber security…

11 years ago

UNHcFREG researchers disclosed flaws dozen Android apps

Researchers from the UNHcFREG (University of New Haven) is publishing on YouTube a series of videos to disclose vulnerabilities in…

11 years ago

This website uses cookies.