Skip to content
Security and tech news with Xploiter.com

Security and tech news with Xploiter.com

Be Safe, Be Secure

Category: Hacks

Posted on June 30, 2017

This Retail Website Considers Password Security Optional

The glaring privacy issues tied to an online health and beauty retailer allows customers to log-in to their users accounts with just their email address – no password needed.

Posted on June 29, 2017

Average Bug Bounty Payments Growing

HackerOne released its first report on its bug bounty program, and reveals an industry shift toward enlisting hackers for better cybersecurity.

Posted on June 27, 2017

Svpeng Behind a Spike in Mobile Ransomware

Mobile ransomware attacks spike in the first quarter of 2017, growing three and a half times compared to the previous year.

Posted on June 23, 2017

GhostHook Attack Bypasses Windows 10 PatchGuard

Researchers at CyberArk have developed a bypass for Windows PatchGuard that leverages Intel’s Processor Trace (Intel PT) technology to execute code at the kernel.

Posted on June 23, 2017

Average Cost of Breach Goes Down For the First Time Ever

The good news is the cost of a data breach is down double-digits, the bad news the size and scope of breaches is creeping up.

Posted on June 22, 2017

Trump’s Cybersecurity Executive Order Under Fire

Former AT&T CSO, Ed Amoroso, says government needs to shift from talk to action when it comes to cybersecurity.

Posted on June 20, 2017

FIN10 Extorting Canadian Mining Companies, Casinos

A string of data thefts targeting North American mining companies and casinos are extorting as much as $620,000 from victims.

Posted on June 17, 2017

Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program

The latest dump from Wikileaks alleges the CIA installed custom router firmware on unsuspecting targets in order to spy on internet activity.

Posted on June 15, 2017

DHS, FBI Warn of North Korea ‘Hidden Cobra’ Strikes Against US Assets

DHS and the FBI warned that North Korean attackers are targeting U.S. businesses with malware- and botnet-related attacks that are part of concerted effort dubbed “Hidden Cobra.”

Posted on June 15, 2017

Decryption Utility Unlocks Files Encrypted by Jaff Ransomware

Researchers have neutralized the latest strain of the Jaff ransomware, releasing a decryption tool for unlocking files.

Posts navigation

Page 1 Page 2 … Page 12 Next page

Recent Posts

  • Health trust rapped on illegal use of patient data in Google AI deal
  • GDPR: who needs to hire a data protection officer?
  • News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online
  • Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools
  • Court Blocks EPA Effort To Suspend Obama-Era Methane Rule

Recent Comments

  • Eric Plambeck on An Assembly Language Primer(C) 1983 by David Whitman
  • Frank van Bommel on Delphi Tips
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • sen on URL Rewriting in Asp.net using URLRewriter

Archives

  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • September 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • March 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008

Categories

  • 2FA
  • angler
  • car hacking
  • certificate authorities
  • chrome
  • Cisco systems
  • Cisco Telepresence
  • Cloud Security
  • Critical Infrastructure
  • Cryptography
  • DDoS
  • DMCA
  • exploit kit
  • Facebook
  • Gmail
  • google
  • Google Transparency Report
  • Government
  • HackerOne
  • Hacks
  • HTTPS
  • ICS
  • IoT
  • IoT botnet
  • IoT devices
  • IoT security
  • IT
  • Javascript
  • Kevin Beaumont
  • Locky
  • malicious JavaScript
  • Malware
  • Microsoft
  • Mirai
  • Mirai botnet
  • Mirai malware
  • Mobile Security
  • mobile spyware
  • Neutrino
  • Nuclear
  • open source software
  • Pegasus
  • Privacy
  • ransomware
  • RIG Exploit Kit
  • SCADA
  • Schneider Electric
  • Science
  • Spyware
  • SSL
  • Uncategorised
  • Uncategorized
  • Vulnerabilities
  • Web Security
  • zero day vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Privacy Policy
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)
Privacy Policy Proudly powered by WordPress
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]