First Version of Sandboxed Tor Browser Available
Developers at the Tor Project have started working on a sandboxed version of the Tor Browser, currently available as an early alpha version for Linux systems. Sandboxing is a securityRead More →
Developers at the Tor Project have started working on a sandboxed version of the Tor Browser, currently available as an early alpha version for Linux systems. Sandboxing is a securityRead More →
On 28 October, the cryptocurrency world saw the emergence of a new player, the Zcash (ZEC) cryptocurrency. Its developers have described it rather figuratively: “If Bitcoin is like HTTP forRead More →
A PricewaterhouseCoopers SAP software, the Automated Controls Evaluator (ACE), is affected by a critical security flaw that could be exploited by hackers. A software developed by PricewaterhouseCoopers for SAP systems, the AutomatedRead More →
President Barack Obama has ordered US intelligence agencies to deeper investigate the alleged Russian interference with the 2016 Presidential Election. President Barack Obama is going to close his Presidential mandate,Read More →
Symantec warns of growing number of malicious scripts. Microsoft PowerShell is a really powerful tool for IT professionals running Windows, and the Redmond-based software giant is making it the defaultRead More →
It’s time to patch your Linux servers and PCs again. The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad newsRead More →
Experts at the Nuclear Industry Summit (NIT) explained how to reduce the risk of damaging cyberattacks at nuclear facilities. The threat of cyber attacks on nuclear power plants and otherRead More →
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000Read More →
State election official bungles the case that DHS tried to breach his office. Accusations that the US Department of Homeland security tried to hack Georgia’s voter registration database are runningRead More →
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more. The trojan’sRead More →
One of the hackers who amassed a new massive army of zombie internet-connected devices that can launch disruptive cyberattacks—even by mistake—now claims to have taken control of 3.2 million homeRead More →
The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone messages. A vulnerability in the Yahoo email service allowed hackersRead More →
A group of malware authors has come up with a new method of transcending an infection from the user’s computer to his Android smartphone. Discovered by security researchers from BadCyberLabs,Read More →
wrote-password-cracking-manual. Password cracking has always been this niche activity during a routine pentest. You collect some hashes, fire up John The Ripper or Hashcat, and use default settings with rulesRead More →
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites. This spamRead More →
Watch how a prankster hacked McDonald’s drive-thru to deliver an f-bomb prank.On a hungry afternoon, you want to eat a nice Mac Burger and decide to visit a McDonald’s drive-thruRead More →
Multiple suspects arrested, bank official reveals. Hackers managed to breach the Russian central bank and steal millions of dollars, but a bank official revealed today that several suspects were arrestedRead More →
BackBox Linux 4.7 Distro with Kernel 4.4 LTS and updated hacking tools released. After being in development for a couple of months, the BackBox distro based on Linux 4.7 andRead More →
An unknown hacker has stolen at least $300,000 in Augur and Ether cryptocurrency from Bo Shen, the founder of venture capital firm Fenbushi Capital, and one of the early adoptersRead More →
Dirty COW (designated as CVE-2016-5195) is a Linux vulnerability that was first disclosed to the public in October 2016. It was a serious privilege escalation flaw that allowed an attacker toRead More →