France proposes to ban Tor and forbid free Wi-Fi
Proposed French Law Would Ban TOR In Response to Paris Terror Attacks France is looking to tighten its censorship laws after the gruesome Paris terror attacks. According to French newspaperRead More →
Proposed French Law Would Ban TOR In Response to Paris Terror Attacks France is looking to tighten its censorship laws after the gruesome Paris terror attacks. According to French newspaperRead More →
A look inside your typical malware campaign.In an optimal scenario, when you get infected with malware, you think it’s only one virus. Unfortunately, in the real world it’s not so,Read More →
Trend Micro reports that 6.1 million devices are affected.A 3-year-old bug in the Portable SDK for UPnP Devices, also called libupnp, is present in millions of modern-day smart TVs, InternetRead More →
Why create your own rooting functions when someone else has already put the effort into doing the same thing Security researchers have detected a new trojan targeting Android devices, butRead More →
More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but alsoRead More →
A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close to a decade, shows a relentless wave ofRead More →
A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that those services are exactly the same that runRead More →
Smartphones are almost always connected to the internet, so it stands to reason that they can be hacked remotely. Or perhaps a jealous boyfriend or girlfriend got hold of yourRead More →
MORE THAN TWO years after Ross Ulbricht was arrested in a San Francisco and accused of creating and running the Dark Web drug bazaar known as the Silk Road, aRead More →
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month, Kazakhstan will begin enforcing a new law thatRead More →
Surreptitious attacks often prey on people visiting legitimate sites. A new wave of crypto ransomware is hitting Windows users courtesy of poorly secured websites. Those sites are infected with Angler,Read More →
Ponmocup is one of the oldest botnet that infected more than 15 million machines across the years, but many experts still ignore it. Ponmocup is one of the largest andRead More →
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First of all download the-backdoor-factory-master from here. Now unzipRead More →
Pub chain JD Wetherspoon says card data of 100 customers has been stolen from a database after it was hacked. “Very limited” credit and debit card information was accessed inRead More →
A HACKER WHO broke into a large bank in the United Arab Emirates made good on his threat to release customer data after the bank refused to pay a bitcoinRead More →
With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities, like CVE-2015-5377 andCVE-2015-1427, this year will be an interesting oneRead More →
Google got accidentally DDoSed by an unnamed European network carrier, sending its cloud service offline on the old continent for about an hour. The incident occurred last Monday, but itRead More →
The Chinese Government says it has arrested the hackers responsible for breaching the Office of Personnel Management database (OPM). The Chinese government has arrested hackers accused of breaking into theRead More →
This report is the continuation of “#root via SMS”, a research made by the SCADA Strangelove team in 2014. It was devoted to telecommunications equipment vulnerabilities with modem flaws onlyRead More →
The UK’s digital spy agency, GCHQ, has admitted for the first time in court that it hacks computers, smartphones, and networks in the UK and abroad. GCHQ’s use of hacking —Read More →