How a crook could have taken over your Facebook pages
It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook,Read More →
It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook,Read More →
Six teenagers, including an 18-year-old from West Yorkshire, have been arrested on suspicion of launching cyber attacks using a service created by a notorious hacking group which previously targeted XboxRead More →
A massive uptick in malvertising has taken place over the last few years and is becoming so popular that it may become the top technique used for drive by attacks,Read More →
Reflective technique would let attacker amplify traffic and flood targets. BitTorrent has fixed a flaw in its technology that quietly turns file-sharing networks into weapons capable of blasting websites andRead More →
Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishingRead More →
Major vulnerabilities have been detected in Dolphin and Mercury Android browsers that could have provided cybercriminals with the opportunity to launch zero-day attacks. This is considered to be a notableRead More →
Agora dark market suspends operations after finding “suspicious activity.” A dark market website that relies on the Tor privacy network to keep its operators anonymous is temporarily shutting down amidRead More →
Booming attack vector offers mass malware distribution, stealthy targeting. Feature Online advertising has become an increasingly potent threat to end-user security on the internet. More hackers than ever are targetingRead More →
Apple’s monster security update of Aug. 13 included a patch for an iOS vulnerability that could beacon out location data and other personal information from a device, even if aRead More →
Social engineering with very obvious assets blinds you to techno-toolkit. MILDLY NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged inRead More →