Hacking

Nissan Finance Canada hacked, 1.13 million customers may have been exposed

Nissan Finance Canada announced on Thursday that the personal information of 1.13 million customers may have been exposed as a…

8 years ago

VMWare addressed severe Code Execution vulnerabilities in several products

VMware has released security updates to address four vulnerabilities in its ESXi, vCenter Server Appliance (vCSA), Workstation and Fusion products.…

8 years ago

Windows 10 Hello facial recognition feature can be spoofed with photos

Experts discovered that the Windows 10 facial recognition security feature Hello can be spoofed using a photo of an authorized user. Security experts at pen-test…

8 years ago

Backdoor in Captcha Plugin poses serious risks to 300K WordPress sites

Experts discovered that the popular WordPress Captcha plugin installed on over 300,000 sites was recently updated to deliver a hidden backdoor.…

8 years ago

Loapi Android malware can destroy your battery mining Monero

Experts from Kaspersky have spotted an Android malware dubbed Loapi that includes a so aggressive mining component that it can destroy your…

8 years ago

South Korea cryptocurrency exchange Youbit shuts down after second hack in 2017

The South Korea Cryptocurrency Exchange Youbit has gone bankrupt after suffering a major cyber attack for the second time this year. The South…

8 years ago

Networked Printers are Some of the Oldest IoT Devices, and over 1,000 Lexmark Printers Are Vulnerable Today

Experts at NewSky Security scanned the Internet and discovered that "out of 1,475 unique IPs, 1,123 Lexmark printers had no…

8 years ago

Researchers discovered two serious code execution flaws in vBulletin not yet unpatched

Two code execution vulnerabilities affecting version 5 of the vBulletin forum software were disclosed by researchers last week. Two code…

8 years ago

BGP hijacking – Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia

Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia, experts believe it was an intentional BGP Hijacking.…

8 years ago

Zealot Campaign leverages NSA exploits to deliver Monero miners of both Windows and Linux servers

Security researchers spotted a sophisticated malware campaign, tracked as Zealot campaign targeting Linux and Windows servers to install Monero miners. Security researchers…

8 years ago

This website uses cookies.