US State Police Have Spent Millions on Israeli Phone Cracking Tech
When cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After plugging the phone in with a cable, andRead More →
When cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After plugging the phone in with a cable, andRead More →
Router manufacturers such as Netgear and ZyXEL have failed to address seven security flaws reported by security researchers in the last three or more months. Following unofficial industry standards, theRead More →
PowerShell is an amazing post-exploitation tool available to the attacker during engagements in Windows environments. Tools like PowerSploit or PowerShell Empire help out a lot during internal test. Problem is,Read More →
Today, on Christmas Eve, G Data malware analyst Karsten Hahn has come across a new ransomware family named DeriaLock, which locks your screen and requests a payment of $30. RansomwareRead More →
Top 10 Famous and Interesting Bugs in The Tech World Computer bugs or coding errors are a common phenomenon in the tech world as almost all software being developed have bugs.Read More →
@Cryptolulz666 and his colleague Kapustkiy broke into the systems of another website belonging to a HK corporation, the Dutch Chamber of Commerce. The hacker @Cryptolulz666, with a little help from theRead More →
Christmas came early for Facebook bug bounty hunter Tommy DeVoss who was paid $5,000 this week for discovering a security vulnerability that allowed him to view the private email addressesRead More →
Bank ATMs are being targeted by a new type of malware that has security researchers puzzled. Alice, as this malicious software is called, was recently discovered by Trend Micro. WhatRead More →
R.I.U. Star Patrol says it plans new DDoS attacks on Dec 25. Hacking group R.I.U. Star Patrol managed to take down Tumblr earlier this week and keep it offline forRead More →
Recently, Proofpoint researchers have observed a number of email campaigns with attached password-protected malicious documents. These documents are primarily used to distribute malware including Cerber ransomware and the Ursnif bankingRead More →