Hacker Sets off All Tornado Sirens in the City of Dallas in the Middle of the Night
A hacker, or group of hackers, has set off all 156 tornado sirens in the city of Dallas, Texas, on the night between Friday and Saturday, April 7 and 8.Read More →
Data Security News | Infosec Blog | Information Security Tutorials
A hacker, or group of hackers, has set off all 156 tornado sirens in the city of Dallas, Texas, on the night between Friday and Saturday, April 7 and 8.Read More →
Nobody seems to know what kind of technology Trump was using during his airstrike on Syria. President Trump ordered a missile strike on Syria last night in response to aRead More →
This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weakRead More →
The malware can snoop on people’s conversations, act as keylogger, take screenshots, control camera and microphone. A new Android RAT malware was detected in the wild, and it is consideredRead More →
It’s a well understood fact that platform security is an integral part of the security of complex systems. For mobile devices, this statement rings even truer; modern mobile platforms includeRead More →
A cyber-espionage group that first surfaced in 2009 is using a novel tactic into hacking its targets by first breaching one of its cloud service providers, and then reaching insideRead More →
Metaspoilt can run on Linux, Mac OS X and on Windows. It is both a command line interface and a graphical user interface (GUI). The Metasploit Framework can be extendedRead More →
Japan plan to develop a hack proof satellite system to protect transmissions between satellites and ground stations with a dynamic encryption of data. Japan’s Internal Affairs and Communications Ministry plansRead More →
Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks. A new attack that uses terrestrial radio signals to hack a wide range of Smart TVs raises anRead More →
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further researchRead More →