Backspace Flaw Enables Linux Zero-Day Attack
Researchers last week revealed a zero-day flaw that lets attackers take over a Linux system by pressing the backspace key repeatedly. Pressing backspace 17 to 20 times will overwrite theRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Researchers last week revealed a zero-day flaw that lets attackers take over a Linux system by pressing the backspace key repeatedly. Pressing backspace 17 to 20 times will overwrite theRead More →
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TORRead More →
North Korea’s homegrown computer operating system mirrors its political one – marked by a high degree of paranoia and invasive snooping on users, according to two German researchers. Their investigation,Read More →
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software hasRead More →
An employee of Russia’s Internet giant Yandex, Dmitry Korobov, stole the source code of its search engine and tried to sell it on the black market to fund his own startup,Read More →
Stealing PINs and pillaging bank accounts are both trivial. Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstratedRead More →
THERE WAS ONCE a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace. Anyone overwhelmed by the hackable perilsRead More →
As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all the information we need to determine the bestRead More →
Presently, there is a worldwide shortage of skilled hackers and salaries are rising rapidly. This is a great time to pursue a career in hacking—and this is a good timeRead More →
Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devicesRead More →