Hacking

Orange hacked for the second time in the year, 1,3M records exposed

French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website…

12 years ago

Does NSA use encoded tweets to conduct a recruiting campaign?

The NSA used the twitter account to send an encoded message that has created the chaos on The Internet. The…

12 years ago

Steganography to hide secret messages in user’s tweets

Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump.…

12 years ago

DNS Protocol affected by a serious flaw, Internet users are at risk

Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a…

12 years ago

Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files.…

12 years ago

Covert Redirect security vulnerability found in OAuth and OpenID

Covert Redirect vulnerability is the security flaw in the open standards for authorization OAuth and OpenID that is menacing IT…

12 years ago

Vishing is still alive and a malicious campaign is scaring banking

Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The…

12 years ago

Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple's data protection mechanisms. Mobile…

12 years ago

Facebook scammers exploit your intention to hack friends’ account

Security Experts at Symantec discovered scammers are exploiting Facebook users' intention to hack friends' account to compromise their profile. Symantec…

12 years ago

Hacking Traffic lights and other control systems is not so hard

Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems.…

12 years ago

This website uses cookies.