Months before its technology became the centerpiece of Samsung’s new mobile payment system, LoopPay, a small Massachusetts subsidiary of the South Korean...
Researchers warn widely used algorithm should be retired sooner. SHA1, one of the Internet’s most crucial cryptographic algorithms, is so weak to...
Transactions were being duplicated in a malleability attack.A Russian man that calls himself “Alister Maclin” has been disrupting the Bitcoin network for...
Researchers warned Tuesday the latest APT to make the rounds features a remote access Trojan that can effectively mitigate security measures on machines and grant...
Linux.Wifatch’s creators call themselves The White Team.The Linux.Wifatch malware, also dubbed as the “vigilante malware” has been going around the Internet, infecting...
HDRoot is the work of the Winnti APT group. Hackers activating mainly in South-East Asia have developed a new bootkit trojan, which disguises...
For hackers, routers are an easy target, perhaps because they are seldom updated and virus-scanned and are also easily cracked. But shockingly,...
In August I visited the Chaos Communication Camp near Berlin. Once every four years this great and world’s greatest hacker festival is...
YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers...
The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few...
It was only old-fashioned detective work that forced Volkswagen to admit to the existence of its ‘defeat device’. And that should worry...
Hack Satellite comunication In this article we will cover satellite based hacking attack which has been used by hacking groups since...
In today world we use satellite communication in many respects and industries and we all know how important they are in our...
Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors...
the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and...
Hackers with links to Russia tried to infiltrate Hillary Rodham Clinton’s home e-mail server at least five times — even as other...
Dark-web deadbeats may not be as anonymous as they think. A bloke in the US was charged on Friday after FBI spyware...
Cyber-crime syndicate tried to intimidate antivirus vendor. In some cases, cyber-security work can turn really dangerous, and even deadly, if you manage to...
Threat actors are using a previously discovered distributed denial-of-service (DDoS) attack tool dubbed XOR DDoS to launch upwards of 20 DoS attacks...
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you...
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released...