A group of researchers from the security firm Promon has demonstrated how cyber criminals could take control of the Tesla Car and steal it. A group of security experts from security firm Promon has demonstrated how to exploit the Tesla app (for both Android and iOS) to locate, unlock and steal a Tesla Model S. The […]
A researcher released a PoC exploit for the cve-2016-9311 flaw that can cause the crash of the NTP daemon and triggers a DoS condition on Windows systems. The NTP protocol could be exploited by hackers as an attack vector. The NTP is a networking protocol widely used for the clock synchronization purpose between systems over packet-switched, […]
Security researchers from Kaspersky Lab are warning of targeted attacks with InPage zero-day against a number of organizations in Asia. According to experts from Kaspersky Lab, a number of organizations in Asia have been targeted with InPage zero-day. InPage is a word processor widely used in Asia because is supports languages such as Urdu, Persian, Pashto and […]
Speake(a)r attack – Security researchers have demonstrated how to turn headphones into a microphone to spy on all target conversations A group of security researchers at Ben Gurion University have demonstrated that it is possible to turn headphones into a microphone to spy on all target conversations in the background without raising suspicious. The team […]
It has happened again, most of the Apple devices crashes when the owner plays this iPhone-freezing video. Be careful when clicking on suspicious links. A new bug  in iPhone is threatening Apple users, most of the Apple devices crashes when the owner plays a video. An iPhone-freezing video is circulating online, when users play it in […]
The hacker group Shad0wS3C is back and hacked the Institute of the Registral Function of the State Mexico (FREM), it leaked the database. Shad0wS3C is Back and hacked the Institute of the Registral Function of the State Mexico (FREM) and leaked a dump of its database. The hacker leaked the database at the following URL https://t.co/6XgwSf4uWW The […]
The Tropic Trooper APT continues to target Asia, this time government Taiwanese organizations and companies in the energy sector. The Tropic Trooper APT that has been active at least since 2012, it was first spotted last year by security experts at Trend Micro when it targeted government ministries and heavy industries in Taiwan and the military in the Philippines. Now […]
Madison Square Garden Company informed users that their payment card data may have been stolen by cybercriminals Yesterday, the Madison Square Garden Company notified users that their payment card data may have been stolen by cybercriminals. According to the company, crooks have used a PoS malware on its payment processing system and have stolen payment […]
Canada Armed Forces recruitment website was taken down after it was hacked and would-be recruits are redirected to a Chinese government page. The Canadian Armed Forces recruitment website was hacked last week, visitors have been redirected to the Chinese government’s main page instead of the legitimate website. According to CTV television, anyone trying to sign […]
Hackers attempted to extort Michigan State University after they have breached into its database containing 400,000 records of students and employees. Crooks hacked the Michigan State University breaching into a database containing 400,000 student and employee records, then tried to monetize the efforts attempted to extort the organization. Michigan State University reported the data breach occurred on November 13 when an unauthorized […]