Hacking

HACIENDA, GCHQ Port Scanning Program on a wide-scale

New revelation on British GCHQ confirms the existence of the HACIENDA Port Scanning Program which is targeting systems in 27…

12 years ago

AdThief malware infected jailbroken Apple devices

Malware expert Axelle Apvrille explained how the iOS AdThief malware infected more than 75000 jailbroken iOS devices hijacking millions advertisements.…

12 years ago

Cisco EnergyWise suite vulnerable to Denial of Service attack

Researchers at BlackHat discovered a Denial of Service Vulnerability in Cisco IOS Software and Cisco IOS XE Software EnergyWise. Researchers…

12 years ago

The network of USIS compromised by a cyber attack

Internal network of USIS was compromised by a cyber attack which has exposed Government Employees' Data. Investigators speculate on a…

12 years ago

Is the Blackphone really so easy to root? Probably no.

A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What's…

12 years ago

F-Secure discovered Xiaomi handset spying on users’data

Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located…

12 years ago

Sophisticated evasion techniques adopted in the Op Poisoned Hurricane

Researchers at FireEye have uncovered a new campaign dubbed Poisoned Hurricane characterized by the use of some clever techniques to…

12 years ago

Malicious Facebook color changer App infected 10000 Users worldwide

Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected…

12 years ago

Attacks on ISP Networks allows to steal $83,000 from Bitcoin Mining pools

Researchers at Dell SecureWorks Counter Threat Unit discovered a theft of Bitcoin made hijacking networks of at least 19 Internet…

12 years ago

Poweliks the persistent malware which doesn’t install any file

Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine.…

12 years ago

This website uses cookies.