Security Latest iMessage Hack Crashes iPhone within Minutes January 2nd, 2017 0 (adsbygoogle = window.adsbygoogle || This time, the attackers have tried a different strategy to hack iMessage app; previously they used to...
Cyber Crime Attacker Embeds Malware in The Guardian's Cybercrime Article December 12th, 2015 0 An article published by The Guardian in 2011 on the topic Cybercrime: is it out of control? received a nasty response from a hacker who inserted a...
Hacking News Anonymous Expose and Shutdown 8824 Pro-ISIS Twitter Accounts November 17th, 2015 0 The online hacktivist group Anonymous has declared a “total war” against the terrorist group and so-called Islamic State (IS,...
Security Hacker Develops Undisputed KillerRat to Spy on Windows PCs November 17th, 2015 0 Egyptian Hacker Uses njRAT Codebase to Create KillerRat --- The RAT goes completely hidden upon scanning. A new Remote Access Trojan/RAT has been...
Hacking News Cyberwar games lead to foul play resulting in leaked Brazilian Army data November 16th, 2015 0 Earlier this week the servers of Brazilian Army got hacked leading to private details of around 7,000 military officials getting stolen. Hackers...
Hacking News Anonymous Waging War on ISIS, Vows to Hunt Down Terrorists After Paris Attacks November 16th, 2015 0 The online hacktivist group Anonymous has announced a new series of cyber attacks against the ISIS/ISIL terrorist group. This Friday, terrorists...
Technology News Security Flaw in Samsung Galaxy Devices Lets Attackers Record Phone Calls November 16th, 2015 0 A telephone tower-like device (IMSI-catcher) can be used for recording phone calls from the latest versions of Samsung Galaxy, demonstrated by two...
Hacking News Did Russian Hackers Breach Spotify Accounts? November 14th, 2015 0 Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of email ids and...
Security How Linux Users are Falling for Ransomware Scam November 11th, 2015 0 Crypto ransomware is the latest in the list of ransomware used by the hackers. This one, though, specifically targets users on Linux operating...
Security Hackers Exploit Kaspersky, Microsoft Security Products to Install Snooping Trojan November 11th, 2015 0 Palo Alto Networks’ research team has identified a new Trojan, which uses security software to side-load DLLs in order to get installed on the...