US blames North Korea for the $81 million Bangladesh cyber heist

US federal prosecutors speculate the involvement of North Korea in the cyber heist of $81 million from Bangladesh’s account at the New...

Fortinet researchers spotted a malware that infects both Microsoft and Apple OSs

Malware researchers at Fortinet have discovered a weaponized Word document that is able to start the infection process on both Microsoft...

QNAP QTS Domain Privilege Escalation Vulnerability

The vulnerability allows any local user, such as “httpdusr” used to run web application, to escalate to Domain Administrator if the NAS...

Data breach – Are you an Android Forums user? Resets your passwords now.

Android Forums notified a data breach, according to the moderators at the site roughly 2.5 percent of users have been affected. Android...

Vault7 Dark Matter batch – CIA has been targeting the iPhone supply chain since at least 2008

Wikileaks released the second bash of CIA’s Vault 7 dump, it contains other precious documents to understand the way CIA was hacking...

US Senate Just Voted to Let ISPs Sell Your Web Browsing Data Without Permission

The ISPs can now sell certain sensitive data like your browsing history without permission, thanks to the US Senate. The US Senate on...

Google Chrome to Distrust Symantec SSLs for Mis-issuing 30,000 EV Certificates

Google announced its plans to punish Symantec by gradually distrusting its SSL certificates after the company was caught improperly issuing...

CYBER CRIME 2017: Το κυβερνοέγκλημα από την Προανάκριση στο Ακροατήριο

Print PDF                                                                                    ...

Apple: Τα συστήματά μας δεν παραβιάστηκαν

Η Apple αρνείται τις φήμες που αναφέρουν ότι hackers απέκτησαν πρόσβαση σε...

Νέα διαρροή από το WikiLeaks: iPhone με προεγκατεστημένα backdoors

Για χρόνια, η CIA αναπτύσσει εργαλεία για την παραβίαση προϊόντων της Apple, και...

Scammer Tricked Two Tech Companies Into Paying $100M

Recently, a scammer has tricked two major US tech companies into paying out of millions of dollars until the investigators caught up with...

Rogue Cellphone towers used to spread the Android Swearing Trojan

Chinese scammers are deploying rogue cellphone towers to spread the Android Swearing Trojan via malicious URL in SMS messages. Chinese...

Turkish Crime Family group will remotely wipe hundreds of millions of iPhones unless Apple pays ransom

Hackers belonging to the Turkish Crime Family group threaten to remotely wipe hundreds of millions of iPhones unless Apple pays a ransom....

Machete espionage campaign continues to target LATAM countries

The threat group behind the Machete cyber espionage campaign first spotted in 2014 continues to target entities in Spanish-speaking...

Breaking: Wikileaks reveals CIA’s Apple MacOS and iPhone Hacking Techniques

As part of its «Vault 7» series, Wikileaks — the popular whistle-blowing platform — has just released another batch of classified...

Russian Hacker Pleads Guilty to Developing and Distributing Citadel Trojan

A Russian man accused of developing and distributing the Citadel Banking Trojan, which infected nearly 11 Million computers globally and...

Google: ασφάλεια σε Android και εφαρμογές στο Google Play το 2016

Η Google ανακοίνωσε το τρίτο ετήσιο Android Security Year In Review report, μια απολογιστική...

ESET Πλαστά Mods στο Google Play για τους παίχτες του Minecraft

Οι ερευνητές της ESET έχουν ανακαλύψει πάνω από 80 κακόβουλες εφαρμογές που...

Code Execution Bug In Github Fetches $18,000 to Hackers

GitHub recently has awarded $18,000 to a researcher after he found a bug in the GitHub Enterprise management console which could have...

More Than 370K Accounts Linked To Terrorism Suspended By Twitter

On this Tuesday, Twitter said that it suspended  376,890 accounts in the second half of 2016 for the reason of “promotion of...

New Metasploit RFTransceiver extension allows testing IoT sevices

Metasploit RFTransceiver extension implements the Hardware Bridge API that will allow organizations to test wireless devices operating...

Once again Three mobile customers in UK experienced data breach

UK Three mobile customers experienced a new data breach, this time a technical issue caused the exposure of their personal details. It has...

Unpatchable “DoubleAgent” Attack Can Hijack All Windows Versions — Even Your Antivirus!

A team of security researchers from Cybellum, an Israeli zero-day prevention firm, has discovered a new Windows vulnerability that could...

Hackers Threaten to Remotely Wipe 300 Million iPhones Unless Apple Pays Ransom

If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th. It has been...

Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan

Chinese Hackers have taken Smishing attack to the next level, using rogue cell phone towers to distribute Android banking malware via...

Hackers ζητούν λύτρα από την Apple για να μην διαγράψουν iPhones

Η Apple φέρεται να βρίσκεται υπό πίεση για να πληρώσει λύτρα σε μια ομάδα hackers...

Ανυποψίαστα ζευγάρια, είδαν τις ιδιωτικές τους στιγμές στο Pornhub

Ένας hacker παραβίασε μια CCTV κάμερα έξω από ένα κλαμπ στο Sunderland και διέρρευσε...

Σεξουαλική κακοποίηση 15-χρονης live στο Facebook

Ένα τρομακτικό περιστατικό εκτυλίχθηκε στο Σικάγο τις τελευταίες δύο...

Ethihak 2017: Οι εγγραφές έκλεισαν! Prepare for the battle!

Ethihak 2017: Release your inner hacker! Οι εγγραφές έκλεισαν…! Τα καλά νέα, σίγουρα θα...

Ubuntu Linux, Safari, Edge and Adobe Reader, Hacked

This year, the ever so popular Pwn2Own event has included $1,000,000 for hackers to grab. Among these pieces of software being targeted are...