New Apple QuickTime Update Patches 12 Vulnerabilities
NYPD detective accused of hiring email hackers
Global Cyber Espionage Operation Named SafeNet Discovered By Researchers
Chinese hackers advertise HACKS FOR SALE
U.S. Power Grid Vulnerable to Attack by Iran,Congressional Report
Iran’s View of Cyberwarfare
Aurora Attack a Counterespionage Effort
Cyber warfare: the Pirates of Aleppo
Twitter two-factor authentication
South Africa Police Service Hacked
The first step for t
Police order officers to be extra careful with computers, external software following fears of an attack; unclear if breach was wide-scale attack o
Iran is prepared to defend itself in case of a "cyber war" which could cause more harm than a physical confrontation, a commander in the
The main executable (dropper) includes 3 resources, each maintains a ciphered program. The cipher is pretty simple – xor by dword.
Knowledge is suppressed because of its power to change.
Online since 30-jan-2010