Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Russian National Vulnerability Database Operation …

Recorded Future says Russia's Federal Service for Technical and Export Control has ability to find, weaponize vulnerabilities under cover of doing technology inspections.The official mission of the organization in charge...

Facebook refuses to remove fake news, but will demote it – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Top 3 Best Voice Changer Apps [2018]

In this article, we will be studying about top 3 best voice changer apps. Before making a deep dive into...

DanaBot Trojan Targets Bank Customers In Phishing Scam

A new phishing scam purports to be MYOB invoices - but really contains a novel banking trojan. Source link

Reasonably Clever Extortion E-mail Based on Password Theft

Reasonably Clever Extortion E-mail Based on Password Theft Imagine you've gotten your hands on a file of e-mail addresses and passwords. You want...

Time to Yank Cybercrime into the Light

Too many organizations are still operating blindfolded, research finds.At a time when the public and governments are watching their every move, today's organizations are up against an unprecedented wave of...

USB Restricted Mode in iOS 11.4.1 now available to all iPhone users – Naked...

The latest version of iOS is now available to all iOS users with eligible devices (iPhone 5s and up). This release not only brings bug fixes, but also includes at...

New Cyber Center Opens at Augusta University in Georgia

University partners with state on $100 million Georgia Cyber Center for cybersecurity education and research.The state of Georgia and Augusta University have opened a new $100 million cybersecurity education and...

Australia’s Airport Security Threatened by Hack

Aviation Security Identity Cards (ASICs) are intended to prevent criminals and terrorists from gaining access to restricted areas in airports, as well as to airplanes, but Australian-based Aviation ID, a...

CSE Malware ZLab – Operation Roman Holiday – Hunting the Russian APT28Security Affairs

Researchers from the Z-Lab at CSE Cybsec analyzed a new collection of malware allegedly part of a new espionage campaign conducted by...

APLICATIONS

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Simply put, cyber resilience is a measure of how well an organization can operate its business during a data breach or cyber attack....

ArkDots – Hacking Tricks

HOT NEWS