Hackers Can Unlock Any HID Door Controller with One UDP Packet
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command and a push of a button, like inRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command and a push of a button, like inRead More →
Security researchers from SentinelOne have discovered a security vulnerability affecting the Apple System Integrity Protection (SIP). Security researcher Pedro Vilaça from SentinelOne has discovered a security vulnerability ( CVE-2016-1757) affectingRead More →
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is unnecessary to remind the importance of cyber capabilitiesRead More →
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet, which allows visitors to view random screenshots takenRead More →
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday said that spying on the US is aRead More →
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeksRead More →
Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites. In late August 2015, Symantec identified a previously unknownRead More →
In-brief: Andrew Auernheimer, an online provocateur who uses the handle “Weev,” has taken credit for causing 30,000 Internet connected printers to spew out antisemitic statements. Many of the connected printersRead More →
The websites and web applications are mission-critical business systems that must operate without security problems to process corporate confidential information. And to respect data protection rules, companies must consider webRead More →
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lotRead More →