Bluetooth Vulnerability

New Bluetooth Vulnerability Affected Millions of Devices that Allow Hackers to Steal the Encryption...

Newly discovered Bluetooth vulnerability in implemented firmware and operating system software drivers allows remote attackers could obtain the encryption key used by the vulnerable devices. This vulnerability...
Remote Desktop Protocol

Malicious Hackers Increasing the Exploitation of RDP Protocol to Hack the Targeted Victims

Nowadays cybercriminals most actively exploiting Remote Desktop Protocol in order to gain access to the targeted victim's computer and steal login credentials and other sensitive...

APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing...

An advanced persistent threat (APT) actor group known by several different names such as Tick, Redbaldknight and Bronze Butler carried out a number of...
PortSmash

PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal...

Researchers discovered a new critical side-channel vulnerability dubbed PortSmash that can allow attackers to steal from other simultaneous process running in the same CPU...
Amazon

Amazon Suffered Data Breach – Customers Name & Email Addresses Exposed

Amazon revealed that it suffered a Data breach before the Black Friday and leaks customers names and Email address. The e-commerce giant sent a message to...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security