Wednesday, December 12, 2018
Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Turkish Banks Suffer Massive Phishing Attacks

October 8, 2018 | By Comodo Loading... The immense wave of phishing attacks hit the users of major banks in...

#44CON: In a Time of Genuine Threats, Talk Sensibly & Act Efficiently

Let’s change the way we talk about security, as global news and incidents are creating new threats. Speaking at 44CON exploring how “Bad analogies make bad realities,” Charl Van Der Walt, strategic director at...

UK Government: Moscow Responsible for NotPetya

The UK government has taken the rare step of attributing a major cyber attack to a foreign administration, claiming the NotPetya ransomware campaign of 2017 was a Russian military effort. “The...

ToolsWatch.org – The Hackers Arsenal Tools Portal » PampaSeg 24-25 de Noviembre (La Pampa,...

ToolsWatch is a Free, Interactive, Modern, Eye-catching service designed to help auditors, pentesters & security Community experts to keep their ethical hacking oriented toolbox up-to-date. We are passionate about helping people...

000000 is Kanye West’s iPhone passcode

So, Kanye West had a meeting with US President Donald Trump at the White House because… well, because 2018, I guess. The shy and retiring Kanye West had quite a lot...

CIA’s “Vault 7” mega-leak was an inside job, claims FBI – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

SAFERVPN CVE-2018-10308 VULNERABILITY, FROM DOS TO DEANONYMIZATIONSecurity Affairs

Researchers Paulos Yibelo explored a vulnerability he found in SaferVPN Chrome Extension. The vulnerability tracked as CVE-2018-10308 should help malicious actors to...

Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim | Threatpost

The popular home automation protocol Z-Wave, used by millions of IoT devices, is vulnerable to a downgrade attack that could allow an adversary to take control of targeted devices, according...

Privilege Escalation in Mr. Robot CTF

Mr. Robot is a vulnerable machine, which has different ports opened. The goal of this machine is to break the security of target machine and find the...

Man who hacked computer system of Washtenaw County Jail to alter inmate records gets...

Konrads Voits, the man who hacked into the computer system of Washtenaw County Jail to alter inmate records and gain early release for his friend, gets 7-Years in prison. In March...

APLICATIONS

Roaming Mantis Swarms Globally, Spawning iOS Phishing, Cryptomining | Threatpost

The Roaming Mantis mobile banking trojan is roaming further afield than it ever has before. Recent analysis shows that the malware has rapidly...

Family Privacy Online

HOT NEWS