• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Signal is down for multiple users worldwide
  • Expert launched Malvuln, a project to report flaws in malware
  • Winnti APT continues to target game developers in Russia and abroad
  • Cisco says its RV routers will no longer receive updates
  • Expert discovered a DoS vulnerability in F5 BIG-IP systems
  • Operation Spalax, an ongoing malware campaign targeting Colombian entities
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 591)

Hacking

ReVuln – gaming platforms as vector of cyber attack

The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform...

March 18, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Indian pentester discovers a flaw in Google Drive

As usual I was reading the news on The Hacker New security portal when a post attracted my attention, another security issue related to an IT giant, Google. The Indian penetration tester Ansuman Samantaray discovered a security flaw in Google drive that...

March 17, 2013  By Pierluigi Paganini   Posted In  Hacking 

NIST – National Vulnerability Database website hacked

The news is curious as it is worrying, unknown hackers have violated the US government repository of standards based vulnerability management website, known as National Vulnerability Database (NVD), last week. The NVD website appears down since last...

March 16, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

XSS vulnerability in 2shared.com reported by Virus_Hima

The Egyption hacker Virus_Hima hit again, he became famous in the latest months thanks the discovery of Adobe and Yahoo vulnerabilities. This hacker is an example, he supports the research and never tried to sell information on flaws discovered on the undergroud,...

March 15, 2013  By Pierluigi Paganini   Posted In  Hacking 

Researcher demonstrated serious flaw in Apple App Store

Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein  was vulnerable for more than half year. The developer...

March 12, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Brilliant hacker Zatko confirms ending of Cyber Fast Track program

The story begun when one of the most famous US hackers Peiter C. Zatko, also known as Mudge and member of hacking group The Cult of the Dead Cow, decided to leave underground to work for private industry and government. He is considered the “intellectual...

March 8, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Java exploit signed with certificate stolen to Bit9

According security experts the numerous cyber attacks that hit principal IT companies, news agencies and government offices exploited zero-day vulnerabilities in Java software to the point that many recommend to uninstall Java plug-in from our browser...

March 5, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

US retaliation strategy against hackers

The year started very difficult for the U.S. government, its networks have been constantly hit by hackers that for different reasons have tried to steal sensitive information and intelligence secrets. The principal menaces against US come from state-sponsored...

March 4, 2013  By Pierluigi Paganini   Posted In  Hacking  Laws and regulations  Security 

Evernote hacked, how respond to yet another data breach?

Another noisy attack has alerted IT community, online note service Evernote is the latest firm to get hacked. The company provides the popular service to around 50 million users,  the attackers accessed data of some users such as usernames, passwords...

March 3, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Serious security flaws affect millions of HTC mobile devices

The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC had security flaws that could exposes users to serious risks in particular the bugs could allow the theft of information stored on the mobile...

February 25, 2013  By Pierluigi Paganini   Posted In  Hacking  Laws and regulations  Security 


« First‹ Previous587588589590591592593594595Next ›Last »
Page 591 of 609




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.