Hackers steal 1.6 million Clash of Kings forum accounts
The official forum for the popular mobile game Clash of Kings is the latest to fall victim to a cyberattack after a hacker broke through its defenses and managed toRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
The official forum for the popular mobile game Clash of Kings is the latest to fall victim to a cyberattack after a hacker broke through its defenses and managed toRead More →
The security flaw is technically unpatchable. Attackers can intercept keystrokes from wireless keyboards as they are transmitted to nearby computers, can log sensitive data, or even inject malicious commands in theRead More →
Is the Kremlin trying to throw the U.S. presidential election to Donald Trump? It sounds like something out of a spy novel. But many cybersecurity experts, as well as theRead More →
The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the sourceRead More →
PHP project fixes issues affecting all PHP versions 5.3+ A team of three researchers went so far as to search and discover a PHP zero-day so they could hack PornHub asRead More →
Misbehaving hidden service directories are scattered around the world. The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form itsRead More →
Softpedia spoke with Rebirth, co-founder of BinarySec. The Anonymous #OpISIS campaign seemed at one point to have slowly died out after the Charlie Hebdo, Paris, and Belgium attacks, but i isRead More →
Far too many otherwise intelligent and talented software developers these days apparently think they can get away with writing, selling and supporting malicious software and then couching their commerce asRead More →
The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vsRead More →
Device was specifically designed for journalists. Infamous NSA whistleblower Edward Snowden and hardware hacker Andrew ‘bunnie’ Huang have presented today at MIT’s Media Lab a new concept for an iPhone hardwareRead More →
Short Bytes: The founder of the world’s largest torrent hosting website KickassTorrents is now behind the bars. The cause of his arrest are the legal purchases he made on Apple’sRead More →
Android Stagefright like attack for iPhone, All it takes is a specially crafted message to hack your iPhone If you remember the Stagefright vulnerability in Android discovered in July last year, youRead More →
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSARead More →
Sites exploited by SoakSoak bots give the gift of CryptXXX malware. If you’ve visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a numberRead More →
Library of Congress and Copyright Office also affected. The US Congress has just recovered after a three-day-long DDoS attack that has crippled its online portal congress.gov, along with adjacent sites suchRead More →
Increasingly, browsers are taking on a central role in our daily lives. With web apps for everything, we have placed our most intimate data on online services such as Facebook,Read More →
Company promises to refund affected users. Steemit, a relatively small social network, announced last Thursday, on July 14, that an unknown attacker had managed to hack its network and steal someRead More →
Office exploit kits updates drop support for CVE-2012-0158. Two newer vulnerabilities targeting the Microsoft Office suite have become very popular in recent months, as Office exploit kit makers have updated theirRead More →
Short Bytes: Apart from knowing the best methods to create a strong password, one should also be aware of the techniques used by hackers to crack them. The recent torrent ofRead More →
Chap responsible for very early nodes says ‘recent events’ make it impossible to continue. Tor’s annus horribilus continues, with one of its earliest contributors, Lucky Green, quitting and closing downRead More →