Hacking

GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for…

12 years ago

Crimea – Is Russia adopting the same cyber strategy used in Georgia?

Experts that are monitoring the escalation of tension in Crimea recognized a military strategy similar to the one adopted in…

12 years ago

Soghoian on government surveillance through service update process

Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris…

12 years ago

Uroburos rootkit, is it part of Russian Cyber weapon programme?

Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber…

12 years ago

Russia Today hacked, tensions from Crimea to cyberspace

Russia Today media agency has been hacked by unknown attackers just after Putin's order to move troops to the Crimea…

12 years ago

Government-built malware and cyber weapons will run out of control

F-Secure's Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of…

12 years ago

Critical flaw in Yahoo allows Hacker to delete 1.5M records

Vulnerability in Yahoo allowed Egyptian hacker to delete more than 1 million and half records from Yahoo database. Yahoo immediately…

12 years ago

More than 360 million stolen credentials available on the black market

Hold Security firm discovered more than 360 million newly stolen credentials and around 1.25 billion email addresses available for sale…

12 years ago

FireEye discovered an Apple vulnerability which allows iOS keylogging

Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…

12 years ago

Chameleon WiFi virus emulates contagion of a common cold within humans

A team of researchers created in the lab the Chameleon WiFi virus, a malware that infects entire WiFi networks replicating…

12 years ago

This website uses cookies.