Internet

A Man Who Hacked More than 11,000 Websites Including U.S. Military & Gov Finally ArrestedA Man Who Hacked More than 11,000 Websites Including U.S. Military & Gov Finally Arrested

A Man Who Hacked More than 11,000 Websites Including U.S. Military & Gov Finally Arrested

A Man who behind the organized cybercrime and defaced more than 11,000 Websites including Various Military, Government and Business Websites Around the World…

7 years ago
Powerful Point-of-Sale Malware “TreasureHunter ” Source Code Leaked OnlinePowerful Point-of-Sale Malware “TreasureHunter ” Source Code Leaked Online

Powerful Point-of-Sale Malware “TreasureHunter ” Source Code Leaked Online

A  long-established Point-of-sale Malware TreasureHunter source code leaked online on Russian based underground forum. Leaked source code including the malware’s…

7 years ago
RCE Vulnerability Over 1 Million Fiber Router Allows Attacker to Bypass all Authentication in Entire NetworkRCE Vulnerability Over 1 Million Fiber Router Allows Attacker to Bypass all Authentication in Entire Network

RCE Vulnerability Over 1 Million Fiber Router Allows Attacker to Bypass all Authentication in Entire Network

Update: Now VPN Mentor has been released a user-friendly patch for affected users who can provide their WebUI URL of the…

7 years ago
25,936 Malicious Apps Use Facebook APIs to Obtain a Range of Information25,936 Malicious Apps Use Facebook APIs to Obtain a Range of Information

25,936 Malicious Apps Use Facebook APIs to Obtain a Range of Information

25,936 malicious apps currently using facebook login or messaging API, capable of obtaining a range of information from the Facebook…

7 years ago
The Technology Behind Bitcoin: The Background, Challenges and RegulationsThe Technology Behind Bitcoin: The Background, Challenges and Regulations

The Technology Behind Bitcoin: The Background, Challenges and Regulations

While you might still be hard-pressed to pass someone on the street who truly understands Bitcoin and what it means…

7 years ago
World’s Biggest DDoS Attack Selling Market Place Finally Taken Down by Operation Power OFFWorld’s Biggest DDoS Attack Selling Market Place Finally Taken Down by Operation Power OFF

World’s Biggest DDoS Attack Selling Market Place Finally Taken Down by Operation Power OFF

Administrators of DDoS-for-hire Service were arrested as a result of a joint Operation Power OFF led by the Dutch police,…

7 years ago
APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking ToolsAPT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

A Well known APT group called Energetic Bear/Crouching Yeti attacked various companies servers with a strong focus on energy and industrial sectors…

7 years ago
Hacker Selling Powerful SquirtDanger Malware in Underground Market that Take’s Screenshot, Steal Wallets & Browser PasswordsHacker Selling Powerful SquirtDanger Malware in Underground Market that Take’s Screenshot, Steal Wallets & Browser Passwords

Hacker Selling Powerful SquirtDanger Malware in Underground Market that Take’s Screenshot, Steal Wallets & Browser Passwords

Newly discovered botnet malware called SquirtDanger is widely Distributing, selling, and trading in the global underground market and infect the…

7 years ago
Critical LinkedIn AutoFill Vulnerability Allow Hackers to Steal LinkedIn Users Sensitive InformationCritical LinkedIn AutoFill Vulnerability Allow Hackers to Steal LinkedIn Users Sensitive Information

Critical LinkedIn AutoFill Vulnerability Allow Hackers to Steal LinkedIn Users Sensitive Information

A new vulnerability discovered in LinkedIn AutoFill functionality leaks users sensitive information to 3rd party websites. LinkedIn provides an AutoFill a future…

7 years ago
More than 20,000,000 Chrome Users are Tricked into Installing Fake Ad BlockersMore than 20,000,000 Chrome Users are Tricked into Installing Fake Ad Blockers

More than 20,000,000 Chrome Users are Tricked into Installing Fake Ad Blockers

Nowadays adblockers are quite popular among user's, but before installing extension it is required to make validation checks to ensure…

7 years ago