GlobaLeaks is open-source / free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and...
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. These tools are designed to help...
Eventbrite-owned San Francisco, California based ticket distribution service Ticketfly’s website has been hacked and defaced – The company has acknowledged the hack...
Teensafe is a monitoring app used by parents for keeping a check on the activities of their children. The app allows parents...
A former CIA engineer is being accused of handing the documents from the Vault 7 series to WikiLeaks. The US government claims...
The U.S Finally identified the suspect who involved the CIA Vault 7 Hacking Tool leaks that contains the Powerful cyber weapons that...
The suspect is CIA’s very own former engineer accused of handing over Vault 7 series documents to WikiLeaks. The government of United States...
According to research conducted by information security professionals at Trustwave, Western Digital’s My Cloud EX2 storage devices filter files to anyone in...
Facebook launched a rewards program to reward users who report about Facebook Data Leaks after the Cambridge Analytica scandal.Facebook pays millions of...
Facebook Vice President Andrew “Boz” Bosworth is known for being blunt and direct at Facebook’s meetings. His Twitter description calls him “co-inventor...
In modern Intel processors, there’s a hardware extension available named Software Guard Extension (SGX) to improve the security aspects. It provides a...
GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and Digital Human...
Game of Thrones season 7 was marred by hacks and leaks to such an extent that apart from seasonal spoilers, hackers managed...
Introduction to Memory Leaks In Java Apps One of the core benefits of Java is the JVM, which is an out-of-the-box memory management....
Almost two months after releasing details of 23 different secret CIA hacking tool projects under Vault 7 series, Wikileaks today announced a...
As a part of its Vault 7 series, in mid-April, Wikileaks dropped a leak that contained six new documents revealing a CIA...
Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today the popular whistleblower organization Wikileaks...
Wikileaks released the source code for Hive on Thursday, a CIA (Central Intelligence Agency) implants used in transferring exfiltrated information from target Windows...
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to...
A critical Tor Browser vulnerability that could transmit their real IP addresses to possible attackers when they visit certain types of web...
TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected. Mac and Linux versions of the Tor anonymity...