Engineers at Chinese firm Lenovo have identified a backdoor in the networking switched namely Rackswitch and BladeCenter firmware. The company stated that...
The Google Play Store is home to more than 3.5 million apps but at the same time, there are tons of apps...
ESET researchers have found that Turla, the notorious state-sponsored cyberespionage group, has added a fresh weapon to its arsenal that is being...
In yet another revelation of severe loopholes, a security researcher James Bercegay from Gulftech has discovered a backdoor in some models of...
The allegations that Russia hacked the 2016 elections in the United States are known to many but now biometric data of millions...
A warning has been issued by researchers disclosing the identification of a backdoor in yet another WordPress plugin called Captcha. This plugin...
A couple of days ago it was reported that an IT security researcher Robert Baptiste who goes by the handle of Elliot Alderson on Twitter...
If you are using OnePlus 5, 3 or its 3T model, an IT security researcher Elliot Alderson (whose real name is Robert Baptiste) has bad...
OnePlus says it’s “looking into” the report. A Twitter user by the name “Elliot Alderson” has discovered a root backdoor in OnePlus...
Just over a month after OnePlus was caught collecting personally identifiable information on its users, the Chinese smartphone company has been found...
Back in September 2017, Positive Technologies’ experts had expressed interest in the development of a technique that can attack the yet secretive...
Security experts have discovered a new hacking tool dubbed NEW IPCAM EXPLOIT containing a backdoor that is offered on several underground hacking...
In June 2016 we reported that the well-known Toronto, Canada-based Internet Media firm VerticalScope became a victim of a huge data breach,...
Previously it was reported that hackers can take over ships by exploiting critical vulnerabilities in VSAT communication system. Now, security consulting firm...
What is backdoor? A backdoor is a method, often secret, to bypass normal authentication or encryption in an integrated computer system, product,...
Reptile is a LKM rootkit for evil purposes. If you are searching stuff only for study purposes, see the demonstration codes. Features...
21,000 Websites Affected after Exploiting of Three WordPress Plugins Zero-day – Solution: Update Those Plugins ASAP. Zero-day vulnerabilities are blessing for cybercriminals...
If you own Hikvision security cameras you would have noticed the sudden change in the live feed display where the normal footages...
Last week news came out that CCleaner software was infected with a backdoor. An initial investigation showed it was a state-sponsored attack. Now,...
Infected CCleaner Software Attack that Affected 700,000 Customers is part of a Wide-scale State-sponsored Cyber-espionage Campaign. Previously we informed you about hacking...
The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the...