security

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…

13 years ago

Raspberry Pi as physical backdoor to office networks

Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to…

13 years ago

US law enforcers suggest a kill switch for mobile and Apple adapts

US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law…

13 years ago

iCloud two-factor protection, security flaw or deliberate choice?

iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to…

13 years ago

Nir Goldshlager Hacked PayPal Users Reports System

The Hacked PayPal Users Reports System has been hacked by popular researcher Nir Goldshlager exploiting a flaw in a third-party…

13 years ago

WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was…

13 years ago

Yahoo Japan suspects 22 million user IDs stolen

Yahoo Japan Corp is investigating on a possible data breach that may have exposed 22 million user IDs stolen during…

13 years ago

Bloomberg data breach, online 10,000 private messages

Bloomberg was the victim of an accident data breach, financial data and news service posted online more than 10,000 private…

13 years ago

The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…

13 years ago

Hacking with new DIY Google Dorks based hacking tool

A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for…

13 years ago

This website uses cookies.