Google Pixel hacked in under 60 seconds by Chinese team
The recently launched Google Pixel phone has been hacked by the Chinese hackers just in less than a minute! A team called White-Hat hackers from Qihoo 360, which participated inRead More →
The recently launched Google Pixel phone has been hacked by the Chinese hackers just in less than a minute! A team called White-Hat hackers from Qihoo 360, which participated inRead More →
Emails tell victims they need to download an attachment to view “suspicious activity” – then infects them with ransomware. In the immediate aftermath of a major data breach, cybercriminals willRead More →
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an attempt to bolster computers, mobiles, and other devicesRead More →
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on the target server. If you can execute python,Read More →
Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily seized a Tor-hidden site known as Playpen in 2015Read More →
Microsoft Edge was hacked twice at this year’s PwnFest Microsoft Edge, which the Redmond-based software giant praised on several occasions for its high level of security, was hacked twice atRead More →
Earlier this month, we discovered a piece of encryption malware targeting Russian users. One of its peculiarities was that it uses Telegram Messenger’s communication protocol to send a decryption keyRead More →
Less than six hours after Donald Trump became the presumptive president-elect of the United States, a Russian hacker gang perhaps best known for breaking into computer networks at the Democratic NationalRead More →
Third-party applications that allow single sign-on via Facebook and Google and support the OAuth 2.0 protocol, are exposed to account hijacking. Three Chinese University of Hong Kong researchers presented atRead More →
Short Bytes: Infecting people’s computers with the help of malicious USB drives is an old trick being used by hackers even today. Going one step ahead, in the recent months, weRead More →