• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Intern caused 'solarwinds123' password leak, former SolarWinds CEO says
  • ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection
  • NSA embraces the Zero Trust Security Model
  • EU leaders aim at boosting defense and security, including cybersecurity
  • New Zealand-based cryptocurrency exchange Cryptopia hacked again
  • Security Affairs newsletter Round 303
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 504)

Hacking

Exploiting BitTorrent flaws to run Distributed Reflective DDoS

Security researchers discovered a new technique to exploit BitTorrent to run powerful DDoS amplification attacks that could bring down great websites. A weaknesses in the open BitTorrent protocol makes some of the most widely used BitTorrent applications,...

August 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

The OwnStar Attack also works with BMW, Chrysler, Mercedes Cars apps

While the Ownstar attack has been fixed by GM, the same flaw affects also BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect apps. Recently I wrote about the OwnStar attack presented by the popular hacker Samy Kamkar, a new gadget designed by the expert...

August 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

Security Affairs newsletter Round 22 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. ZigBee-sniffing drone used to map online Internet of Things RollJam, a $30 device to unlock...

August 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Digital ID  Hacking  Intelligence  Malware  Mobile  Security 

How to hack a Parrot drone on the fly

Two security researchers at the recent Def Con conference presented the results of their studies on hacking Parrot drones.  Their findings are surprising. At the recent Def Con conference in Las Vegas, security experts demonstrated in two different...

August 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Zero-Day in the Google Admin App can bypass Android sandbox

MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws...

August 15, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile  Security 

Cisco warns hackers are installing malicious ROMMON images on its devices

Cisco is warning enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images. Be aware network administrators, Cisco released a new Security Activity Bulletin referring a spike...

August 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense...

August 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Hack Satellite Connection and Surf Anonymously with High-speed Internet

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet. Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network...

August 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Attackers exploit a Windows flaw using a booby-trapped USB

Microsoft announced in the Tuesday's bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday's bulletin that crooks have been exploiting a vulnerability...

August 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware 

Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook's...

August 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Social Networks 


« First‹ Previous500501502503504505506507508Next ›Last »
Page 504 of 619



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT