Hacking

Expert shows how to trigger blue-screen-of-death on Windows by triggering NTFS flaw

Bitdefender researcher Marius Tivadar has developed a dodgy NTFS file system image that could trigger a blue-screen-of-death when a mount is attempted…

8 years ago

How to use weaponized PDF documents to steal Windows credentials

Weaponized documents are the main ingredient for almost any spam and spear-phishing campaign, let's see how to steal windows credentials…

8 years ago

Necurs Spam Botnet operators adopt a new technique to avoid detection

Operators behind the Necurs botnet, the world's largest spam botnet, are currently using a new evasion technique attempting to surprise…

8 years ago

Rubella Macro Builder Crimeware Kit gains popularity on cybercrime underground

A new crimeware kit dubbed the Rubella Macro Builder is rapidly gaining popularity in the cybercriminal underground, experts already spotted…

8 years ago

Hacking the Amazon Alexa virtual assistant to spy on unaware users

Checkmarx experts created a proof-of-concept Amazon Echo Skill for Alexa that instructs the device to eavesdrop on users’ conversations and then…

8 years ago

F-Secure experts devised a Master Key that unlocks millions of hotel rooms

A security duo has built a master key that could be used to unlock doors of hotel rooms using the Vision…

8 years ago

CVE-2018-7602 – Drupal addressed a new vulnerability associated with Drupalgeddon2 flaw

The new flaw tracked as CVE-2018-7602, is a highly critical remote code execution issue, Drupal team fixed it with the release of…

8 years ago

Western Digital MY CLOUD EX2 storage devices leak files

Researchers at Trustwave have discovered that Western Digital My Cloud EX2 storage devices leak files. Security experts at Trustwave have…

8 years ago

Do Not Disturb app will protect your device from evil maid attacks

Former NSA expert and white hat hacker Patrick Wardle has released an app named Do Not Disturb app that can be…

8 years ago

Expert devised a exploit for a Code Execution vulnerability in NVIDIA Tegra Chipsets

Security researchers Kate Temkin discovered a vulnerability in the NVIDIA Tegra chipsets that could be exploited for the execution of custom code on…

8 years ago

This website uses cookies.