This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning...
Security experts at Kaspersky have spotted in the wild a new variant of AlienSpy RAT Family openly offered with a model of...
T9000 can also steal files from your hard drives. A new backdoor trojan is making the rounds, coming equipped with features that allow...
Backdoor code was committed by a former Oracle employee. Developers of Socat, a *NIX-based networking utility, have discovered and patched a security bug...
Recently we came across a new family of cross-platform backdoors for desktop environments. First we got the Linux variant, and with information...
MediaTek may not be on the short list of SoC companies whose chips you seek out when buying a new phone, but...
Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a...
Casey Smith recently shared his research on twitter, which is to reverse HTTP Shell by using JavaScript. I found it rather interesting...
Scans for Fortinet devices have intensified. An unknown group has been scanning the Internet for old Fortinet equipment that includes a secret SSH...
Highly privileged account could be used to hack customers’ networks, researchers warn. A company that supplies audio-visual and building control equipment to...
GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government...
This is how a $30 D-Link webcam can be converted into a backdoor. Researchers at US security firm Vectra Networks have hacked a ‘tiny’...
The sport of holding Apple, Google and other tech companies over a barrel to demand backdoors now has a new player: New...
The stolen Bitcoin & Litecoin were worth over $5.7 million. Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a...
Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series...
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line...
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security...
The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal...
Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered...
Cyber-espionage group targeted companies in Asia. Details about the operations of a new cyber-espionage group are emerging, and this gang has been buying...
FBI director James Comey called on tech companies to create backdoor access to their users’ data on Wednesday, arguing it was necessary...