News

A backdoor present in many D-Link devices allows to bypass authentication

A backdoor present in many D-Link devices allows to bypass authentication Researcher Craig published an interesting blog post…

Google Chrome users are vulnerable to sensitive data theft

Google Chrome users are vulnerable to sensitive data theft Security experts at Identity Finder demonstrated that Google…

How to exploit iFramed based traffic E-shop for illegal activities

17 October 2013 16:00 EST How to exploit iFramed based traffic E-shop for illegal activities What is an…

Blackhole author arrested. The impact on the underground market

Blackhole author arrested. The impact on the underground market The author of the Blackhole exploits kit has…

2013 Norton Report, the impact of cybercrime according Symantec

2013 Norton Report, the impact of cybercrime according Symantec Symantec issued 2013 Norton Report, the annual research…

Ponemon Institute issued the 2013 Cost of Cyber Crime Study

Ponemon Institute issued the 2013 Cost of Cyber Crime Study HP sponsored a study of Ponemon Institute that reveals…

How to create undetectable malware with Mac encryption mechanism

How to create undetectable malware with Mac encryption mechanism Researcher Daniel Pistelli demonstrated how to exploit Mac internally…

How NSA tries to compromise Tor anonymity. Tor Stinks document

How NSA tries to compromise Tor anonymity. Tor Stinks document Top-secret presentation Tor Stinks leaked by Snowden shows…

Adobe security breach, hackers steal 2.9M accounts and source code

Adobe security breach, hackers steal 2.9M accounts and source code Adobe reveals customer data stolen in security…

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh – Can you trust your VPN provider? Maybe … Proxy.sh VPN service with no-logging policy announced…

Show Buttons
Hide Buttons