• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Signal is down for multiple users worldwide
  • Expert launched Malvuln, a project to report flaws in malware
  • Winnti APT continues to target game developers in Russia and abroad
  • Cisco says its RV routers will no longer receive updates
  • Expert discovered a DoS vulnerability in F5 BIG-IP systems
  • Operation Spalax, an ongoing malware campaign targeting Colombian entities
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 584)

Hacking

Brain hacking, it’s time to protect our mind from hackers

Brain hacking is the act to read the content of the human brain and modify it, is the technology mature to allow hackers to penetrate our mind? Brain hacking refers the possibility to attack the human brain to extract sensitive information such as data...

August 20, 2013  By Pierluigi Paganini   Posted In  Hacking 

Short Password Reset code vulnerability allows hackers to brute-force many websites

Indian hacker reported a Short Password Reset code vulnerability that could allow attackers to brute-force many high profile websites not protected by CAPTCHA verification system. Yesterday we received a vulnerability report in web applications from...

August 19, 2013  By Pierluigi Paganini   Posted In  Hacking 

USB Internet Modems vulnerability exposes Millions of PCs

The Indian security expert 'Rahul Sasi' found a USB Internet Modems vulnerability that could allow to gain Meterpreter shell or  full access to the victim just sending an SMS. The Indian Security expert 'Rahul Sasi' announced to have found a USB Internet...

August 18, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

The Hackers Conference 2013 – Hackers will Demonstrate Digital Dangers

This is the second edition of 'The Hackers Conference'. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held...

August 18, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Chinese hackers that hit NYT are evolving their techniques

FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times. A new series of cyber attacks...

August 15, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware 

The cyber capabilities of Iran can hit US

A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States" states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical...

August 14, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

DNS impairment redirects thousands of websites to malware

Cybercriminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware. DNS impairment or rather compromising DNS to distribute malicious code, cyber criminals...

August 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 

Discovered 2 new Facebook vulnerabilities

The Security researcher Dan Melamed has found two new Facebook vulnerabilities related to the Fanpage Invite of the popular social network. Security researcher Dan Melamed has found 2 new Facebook vulnerabilities that has been recently patched and that...

August 9, 2013  By Pierluigi Paganini   Posted In  Hacking 

Researcher found critical vulnerabilities in major websites

Security Researcher Mohamed Osman Saeed has found a long series of critical vulnerabilities in major websites but he could not participate to any bounty program because he lives in the sanction country –Sudan. Security Researcher Mohamed Osman...

August 8, 2013  By Pierluigi Paganini   Posted In  Hacking 

Chinese Comment Crew caught taking over a fake Water Plant

Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system...

August 7, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 


« First‹ Previous580581582583584585586587588Next ›Last »
Page 584 of 609




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.