• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • North Korea-linked campaign targets security experts via social media
  • Dutch police arrested two people for the illegal sale of COVID-19 patient data
  • Ransomware attack hit WestRock IT and OT systems
  • Cryptomining DreamBus botnet targets Linux servers
  • Cryptocurrency exchange BuyUcoin hacked, data of 325K+ users leaked
  • Tesla sues former employee for allegedly stealing sensitive docs
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 501)

Hacking

Bitdefender Hacked, customer data being sold In the underground

Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popularĀ Antivirus firms BitDefender has been hacked...

August 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

MIT researchers identify Tor hidden services with 88 percent accuracy

Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy. Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which...

August 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

A new flaw in BIND is threatening the Internet’ core

A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited...

August 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

Hack your General Motors Car with $100 Ownstar

The popular hacker Samy Kamkar has presented a new gadget that could be exploited to hacks GM Cars. The tool allows to locate, Unlock, and Start Them. Do you have a General Motors car? Do you have $100 to spare? Do you want to hack your car? If the reply...

July 31, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

APT 29 use Twitter to control its Hammertoss data stealer

Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask...

July 31, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Reports 

Hackers can disable high-tech sniper rifles and change the target

A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking ... this time we will discuss remote hacking of High-tech Sniper Rifles....

July 31, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Trend Micro revealed a new Android vulnerability renders Android Devices inoperable

Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserverĀ service,...

July 30, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company's office?Ā  Most probably you are using...

July 30, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

United Airlines reportedly hacked by same APT that breached OPM, Anthem

United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let's try to understand why and which are the risks for the US citizens. A ChineseĀ APT group Ā believed to be responsible for a series of high-profile data breaches that affected...

July 30, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Intelligence 

A part of an unclassified Pentagon email network taken down over suspicious activity

Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of Defence’sĀ email network...

July 30, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Intelligence 


« First‹ Previous497498499500501502503504505Next ›Last »
Page 501 of 612



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.