Tracking a Bluetooth Skimmer Gang in Mexico
Halfway down the southbound four-lane highway from Cancun to the ancient ruins in Tulum, traffic inexplicably slowed to a halt. There was some sort of checkpoint ahead by the Mexican FederalRead More →
Halfway down the southbound four-lane highway from Cancun to the ancient ruins in Tulum, traffic inexplicably slowed to a halt. There was some sort of checkpoint ahead by the Mexican FederalRead More →
This vulnerability was discovered by Rafal Wojtczuk and Corey Kallenberg, check original white paper. Around one month ago, at 31-st Chaos Communication Congress, Rafal Wojtczuk and Corey Kallenberg presented anRead More →
A new ATM malware has hit the streets and it’s called Suceful. This new malware seems to have been created in August 2015, and it is unclear if it is still underRead More →
Apple is traditionally mum on some details of its devices’ hardware, preferring to talk about how “B is X times faster than A” than raw numbers. It’s partly a smartRead More →
Answers on a postcard from Syria, please. GCHQ has declined to comment on a report in the Daily Telegraph this weekend, which claimed that UK cabinet ministers’ emails had beenRead More →
Networking process crashed by crafted packets. One of the world’s major suppliers of industrial networking kit, Japanese company Yokogawa, has alerted the world to a vulnerability in 21 of itsRead More →
Hackers linked to known North Korean attack points and methods exploited a zero-day vulnerability in the Hangul Word Processor (HWP), widely deployed in the offices of the South Korean government.Read More →
Apple will release iOS 9 next week, and some iOS 8 users who rely on unofficial apps installed on their iPhones and iPads after jailbreaking them are worried about upgrading.Read More →
Since Edward Snowden exposed the extent of online surveillance by the US government, there has been a surge of initiatives to protect users’ privacy. But it hasn’t taken long for oneRead More →
Webmasters should regularly check the list of verified owners for their websites in the Google Search Console. Hackers who compromise websites are also increasingly verifying themselves as the owners ofRead More →