Tech News

Home Tech News

Secure Dynamic Middleware for Defeating Port and OS Scanning

SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning Dalal Hanna, Prakash Veeraraghavan and Ben Soh Department of Computer Science and Information Technology, La Trobe...

Iranian websites attacked

A number of Iranian websites came under a cyber-attack on Monday night, Iran’s Minister of Communication and Information Technology Mohammad Javad Azari Jahromi confirmed. A...

Hacking sex toys

It’s hopefully well known by now that Bluetooth’s baby brother, BLE, isn’t exactly stellar when it comes to security. What you save in battery...

Zerodium Offers $1 Million for Tor Browser 0-Days That It will...

It seems like Tor Browser zero-day exploits are in high demand right now—so much so that someone is ready to pay ONE MILLION dollars. Zerodium—a...

Russian hackers hack 50 USA nuclear power plants?

It is now beyond reasonable doubt that the United States is under consistent digital attack by foreign hacking groups linked to hostile governments. This year...

Equifax: Data breach hack

Credit-reporting company Equifax shocked investors, and more than a third of America, when it announced on Thursday afternoon that hackers had breached its data systems, compromising...

China arrests 11 hackers for infecting 250M devices with Fireball malware

Law enforcement authorities in China have arrested eleven hackers suspected of developing Fireball malware which infected 250 million computers worldwide. Among the infected devices, 20 percent belonged to...

Massive Goldeneye Ransomware Attack Hits Users Worldwide

Computer systems around the world have been hit with a new ransomware malwarecalled Goldeneye, a variant of Petya ransomware. Its targets are governments and businesses; infecting...

Netflix’s Orange Is the New Black Season was Stolen Using Windows...

In April this year, DarkOverLord a Dark Web hacking group stole and held season 5 of popular TV show Orange Is the New Black...

A Dark Web service claims to track any phone and read...

Experts who understand how phone networks work as well as what their vulnerabilities are have warned about its dangers for years. However, it would...