Update Google Chrome Browser to Patch New Critical Security Flaws

Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade the application to the latest available version immediately.

Started rolling out to users worldwide this Wednesday, the Chr… Continue reading Update Google Chrome Browser to Patch New Critical Security Flaws

Here’s the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

EXCLUSIVE — While revealing details of a massive supply chain cyber attack against ASUS customers, Russian security firm Kaspersky last week didn’t release the full list all MAC addresses that hackers hardcoded into their malware to surgically target a… Continue reading Here’s the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a Faraday cage—are back with its new research showing how two (or more) air-gapped PCs placed in the same room can co… Continue reading MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and di… Continue reading 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

This $5 Device Can Hack your Password-Protected Computers in Just One Minute

You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 seconds to hack into any computer.

Well-known hardware hacker Samy Kamkar has once again devised a cheap exploit tool, … Continue reading This $5 Device Can Hack your Password-Protected Computers in Just One Minute

Oh, It’s On Sale! USB Kill to Destroy any Computer within Seconds

Remember Killer USB stick?

A proof-of-concept USB prototype that was designed by a Russian researcher, Dark Purple, last year, to effectively destroy sensitive components of a computer when plugged in.

Now, someone has actually created the Killer USB stick that destroys almost anything – such as Laptops, PCs, or televisions – it is plugged into.
<!– adsense –>
A Hong Kong-based technology

Continue reading Oh, It’s On Sale! USB Kill to Destroy any Computer within Seconds

New Hack Uses Hard Drive’s Noise to Transfer Stolen Data from Air-Gapped Computer

Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classif… Continue reading New Hack Uses Hard Drive’s Noise to Transfer Stolen Data from Air-Gapped Computer

How Your Computer Monitor Could Be Hacked To Spy On You

Just stop believing everything you see on your screen, as it turns out that even your computer monitor can be hacked.

You have seen hackers targeting your computer, smartphone, and tablet, but now, it has been proved that they can even compromise your… Continue reading How Your Computer Monitor Could Be Hacked To Spy On You

Facebook Open Sources its Capture the Flag (CTF) Platform

Hacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking skills in a legally safe environment?

Facebook just open-sourced its Capture The Flag (CTF) platform to encourage s… Continue reading Facebook Open Sources its Capture the Flag (CTF) Platform

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

No matter how secure you think your computer might be, something malicious can always happen. As a Computer is an open book with right tools and talent.
The same is proved by a group of security researchers by hacking into a computer with no internet, … Continue reading How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard