- By Eduard Kovacs
- February 10th, 2012
Indianapolis Super Bowl 2012 Site Vulnerable to Attacks
The security hole was reported on the day of the big game
- By Eduard Kovacs
- February 10th, 2012
Video: Anonymous Threatens the Government of Israel
The hacktivists promise a present to the state of Israel
- By Eduard Kovacs
- February 10th, 2012
Hamas Site Hacked for Advertising Violence Against Israeli Citizens
Cyberspace witnesses a war of its own in the Middle East
- By Eduard Kovacs
- February 10th, 2012
Video: Boston Police Responds to Anonymous Hacking
The Boston Police Department released an amusing video
- By Eduard Kovacs
- February 10th, 2012
Romanian NASA Hacker Indicted by US Prosecutors
Iceman may be sentenced to ten years in a US prison
- By Eduard Kovacs
- February 9th, 2012
ZHC Leaks 200 Credit Cards in OpFreePalestine
US and Israeli websites were hacked to obtain the data
- By Eduard Kovacs
- February 9th, 2012
Google Responds to Wallet PIN Exposure Issue
The company highlights that the attacks only work on rooted devices
- By Eduard Kovacs
- February 9th, 2012
Fiat Website Hacked and Defaced by ZHC
The virtual battle between Pakistan and India continues
- By Eduard Kovacs
- February 9th, 2012
Video PoC: Vulnerability in Cyberoam Central Console 2.0
Vulnerability Lab researchers found a flaw in another popular application
- By Eduard Kovacs
- February 8th, 2012
Yale University Website Hacked by TeamHav0k, Data Leaked
Another university website proves to be highly vulnerable
- By Eduard Kovacs
- February 8th, 2012
Peruvian and Nigerian Government Sites Hacked, Data Exposed
Members of TeaMp0isoN continue to hack major government sites
- By Eduard Kovacs
- February 8th, 2012
RealPlayer 15.02.71 Addresses 7 Highly Critical Vulnerabilities
Users are advised to update to make sure they're protected
- By Eduard Kovacs
- February 8th, 2012
Swagg Security Hackers Leak Data from Foxconn
Foxconn was targeted for the way the company treats its employees
- By Eduard Kovacs
- February 8th, 2012
Malicious Code Disguised as Google Analytics on Compromised Sites
Cybercriminals use a clever way to make their schemes harder to detect
- By Eduard Kovacs
- February 8th, 2012
12 Charged for Participating in Cell Phone Cloning Scheme
The accused individuals presumably earned millions of dollars
- By Eduard Kovacs
- February 7th, 2012
Fraudsters Install Skimmer on ATM Vestibule Door
They were arrested soon after, otherwise 90 people would have lost their savings
- By Eduard Kovacs
- February 7th, 2012
Nokia Australia Hacked, Subdomain Defaced
Subdomains dedicated to media representatives seem to be more vulnerable