Hacking

Severe vulnerability in GE Multilin SR poses a serious threat to Power GridSevere vulnerability in GE Multilin SR poses a serious threat to Power Grid

Severe vulnerability in GE Multilin SR poses a serious threat to Power Grid

Security experts discovered a critical vulnerability in GE Multilin SR that poses a serious threat to the power grid worldwide.…

8 years ago
DOK malware, a stealthy MAC OS spyware that inspects your HTTPS TrafficDOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK Malware is a stealthy malicious code recently discovered by researchers at security firm CheckPoint, it affects almost ant Mac…

8 years ago
StringBleed SNMP Authentication Bypass affects numerous devices onlineStringBleed SNMP Authentication Bypass affects numerous devices online

StringBleed SNMP Authentication Bypass affects numerous devices online

Security researchers discovered an SNMP flaw dubbed StringBleed that affects several models of Internet-connected devices. Simple Network Management Protocol (SNMP) authentication bypass…

8 years ago
Kali Linux 2017.1 is arrived, more power for password-cracking with cloud GPUsKali Linux 2017.1 is arrived, more power for password-cracking with cloud GPUs

Kali Linux 2017.1 is arrived, more power for password-cracking with cloud GPUs

Kali Linux 2017.1 rolling release was announced, the popular distro comes with a set of significant updates and features. The…

8 years ago
Cryptology for Business and Organizations on the 21st centuryCryptology for Business and Organizations on the 21st century

Cryptology for Business and Organizations on the 21st century

Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and communications.…

8 years ago
The Israeli Government announces it thwarted a major cyberattackThe Israeli Government announces it thwarted a major cyberattack

The Israeli Government announces it thwarted a major cyberattack

The Israeli Government announces it thwarted a major cyberattack against 120 targets just days after harsh criticism of new cyber…

8 years ago
The Hajime Botnet continues to grow and implements a new attack techniqueThe Hajime Botnet continues to grow and implements a new attack technique

The Hajime Botnet continues to grow and implements a new attack technique

The mysterious Hajime Botnet continues to grow and reached 300,000 IoT Devices, the author also implemented a new attack method.…

8 years ago
Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehiclesSecurity vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security…

8 years ago
Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploitCybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit

Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit

The Interpol located and shut down nearly 9,000 Command and control servers located in Asia and hacked with a WordPress…

8 years ago
R2Games company breached for the second time in two years, over one million accounts compromisedR2Games company breached for the second time in two years, over one million accounts compromised

R2Games company breached for the second time in two years, over one million accounts compromised

R2Games compromised for the second time in a few years, more than one million accounts of U.S., France, German, and…

8 years ago