Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Comodo Dome Shield 1.16 | Best Defense from Web-borne Threats

June 6, 2018 | By Comodo Announcing Comodo Dome Shield 1.16 It’s been around a year since we first launched Comodo Dome Shield, the FREE of charge DNS-based security service. Dome Shield...

Flaw exposed Comcast Xfinity customers’ partial home addresses and SSNs

Poor security measures have reportedly put the personal details of Comcast Xfinity customers at risk, a researcher has revealed. According to a BuzzFeed News report, security researcher Ryan Stevenson found a...

Dirty Sock Flaw Allows Hackers to Gain Root Access on Linux systems

The researcher discovered a new privilege escalation vulnerability called Dirty Sock on Ubuntu Linux default installation lets attacker gain immediate root to the system. This serious vulnerability existing in the Linux...

Why establishing it will be hard.

Are AI ethics hard? Or confusing? The first problem with establishing a code of ethics (let alone code of ethics in the field of artificial intelligence) is that ethics are too...

Amazon staff said to be taking bribes to leak data

The Wall Street Journal reports that Amazon employees have been bribed to leak corporate data - such as sales metrics and the personal details of reviewers - to sellers: In exchange...

Great Gesture by Mohammed Siraj after 14 year kid hacked his account and got...

With the increase in cybercrimes nowadays, social media accounts are the ones which are the most vulnerable. The rate of them getting hacked is increasing day by day. One of...

Most IT Execs Have Zero Control Over Password Hygiene

Despite the clear danger that passwords pose to organizations, more than half of IT executives in a recent survey said they rely solely on employees to monitor their own password behavior. Despite...

DarkPulsar and other NSA hacking tools used in hacking operationsSecurity Affairs

Attackers are targeting high-value servers using a three of hacking tools from NSA arsenal, including DarkPulsar, that were leaked by the Shadow Brokers hacker group. The...

Coinvault, the court case – Securelist

Today, after almost 3 years of waiting, it was finally the day of the trial. In the Netherlands, where the whole case took place, the hearings are open to the...

APLICATIONS

Senator calls on US Government to start killing Adobe Flash now

Security-conscious IT administrators around the globe know that they shouldn’t really have Adobe Flash in their organisation. For years, researchers have bemoaned Adobe Flash...

HOT NEWS