Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popularĀ Antivirus firms BitDefender has been hacked...
Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popularĀ Antivirus firms BitDefender has been hacked...
Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy. Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which...
A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited...
The popular hacker Samy Kamkar has presented a new gadget that could be exploited to hacks GM Cars. The tool allows to locate, Unlock, and Start Them. Do you have a General Motors car? Do you have $100 to spare? Do you want to hack your car? If the reply...
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask...
A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking ... this time we will discuss remote hacking of High-tech Sniper Rifles....
Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserverĀ service,...
Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company's office?Ā Most probably you are using...
United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let's try to understand why and which are the risks for the US citizens. A ChineseĀ APT group Ā believed to be responsible for a series of high-profile data breaches that affected...
Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of DefenceāsĀ email network...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.