A design flaw within the Windows kernel could be exploited by attackers to evade antivirus and stop them from recognizing…
Hackers are exploiting in the wild a critical remote code execution vulnerability in Apache Struts 2, tracked as CVE-2017-9805, that was patched…
Today I have the pleasure to interview Jonturk 75 one of the hackers that hit high profile targets, including the notorious hacker…
The DolphinAttack technique allows hackers to control Siri, Google Now, Alexa and other voice assistants with commands in ultrasonic frequencies.…
Equifax, one of the three major US consumer credit reporting agencies is the last victim of a data breach that…
The European biggest hacker collective Chaos Computer Club demonstrated that PC-Wahl software used in Germany for vote counting is insecure.…
Malware researchers at Palo Alto Networks have spotted a 2007 variant of Babar, a strain of malware likely designed by…
WikiLeaks has published a new batch of documents that details the Project Protego, a secret CIA Missile Control System Project…
Boffins have discovered a series of code execution and denial of service flaws in the bootloaders of popular mobile platforms…
The dreaded hacking group ShadowBrokers posted a new message, promising to deliver two data dumps a month as part its…
This website uses cookies.