The ‘Sin’ Card: How criminals unlocked a stolen iPhone 6S
Even if you have an iPhone 6S protected by a 6 digits password plus the touch ID fingerprint it is possible to unlock it. 1. Introduction You have an iPhoneRead More →
Even if you have an iPhone 6S protected by a 6 digits password plus the touch ID fingerprint it is possible to unlock it. 1. Introduction You have an iPhoneRead More →
VeraCrypt 1.19 released to fix 8 critical issues. The VeraCrypt project has released version 1.19 to fix a series of security flaws discovered during a recent security audit paid theRead More →
Spear-phishing and malware at the root of the intrusion.From November 2015 to June 2016, hackers targeted researchers at the University of Toyama’s Hydrogen Isotope Research Center, the University told JapaneseRead More →
Experts from the White Fir Design discovered cybe rcriminals exploited a zero-day flaw in an e-commerce plugin for WordPress to upload a backdoor. According to the experts from the firmRead More →
Newt Gingrich brokered deal for moonlighting contractor to hunt for potential breach. More records from the Federal Bureau of Investigation’s review of Hillary Clinton’s e-mail practices have been released throughRead More →
Malware hides credit card data inside image files. Hackers are collecting payment card data from Magento stores, hiding the stolen data inside JPG images, which they’re downloading from infected storesRead More →
NRSC hack – A platform used by the National Republican Senatorial Committee for the donations was hacked and donors’ financial data have been exposed. Other rumors around the Presidential Election,Read More →
It’s been several weeks since the story broke about Trident/Pegasus and the vulnerabilities they exploited in iOS. There has certainly been a significant (although a lot less than expected) amount ofRead More →
Logins and passwords that match Netflix accounts have been released by a separate company, Netflix said today in an email to affected customers. I found out via email, as IRead More →
Who needs complicated malware when you have dynamite.Criminals like to use explosives to break into ATMs, rather than deploy malware, a recent European ATM Security Team (EAST) report has shown.Read More →