iPad Air Giveaway Lure Used for Phishing Website

The message is enough to reveal the scam, but users still fall for it
by Ionut Ilascu, August 12th, 2014
DefCon 2014: Hackers Bypass Fashion Conventions

DefCon 2014: Hackers Bypass Fashion Conventions

by Ionut Ilascu, August 11th, 2014
Free spirits gather at DefCon to show off fashion and skills
 

Oracle Data Redaction Service Vulnerable to Trivial Bypassing

Researcher says Oracle should fix fundamental flaws, not patch the code
by Ionut Ilascu, August 11th, 2014
 

Researcher Grabs Scammer’s Picture with His Own Camera

Zeus Trojan's protection mechanism bypassed using publicly available hacking tools
by Ionut Ilascu, August 8th, 2014
Security Consultant Gains Control of Luxury Hotel Rooms

Security Consultant Gains Control of Luxury Hotel Rooms

by Ionut Ilascu, August 7th, 2014
Hotel room environment could be control by an attacker in another country
 

Xiaomi RedMi 1S Phone Sends Details to Mothership

Phone delivers phone numbers, IMSI details to a remote server
by Ionut Ilascu, August 7th, 2014
 

Paw Security Hackers Attack Chinese Websites

Animal cruelty is the motivation against taking down Chinese websites
by Ionut Ilascu, August 7th, 2014
 

US Plextor Website Hacked by CoMoDo Islamic Hackers

Access to original content is blocked, pages littered with hacker material
by Ionut Ilascu, August 7th, 2014
 

OpenSSL Receives Nine Security Fixes

Researchers from different companies found and reported the vulnerabilities
by Ionut Ilascu, August 7th, 2014
 
Want more? Browse: