Archives - Hackers


What’s the relation between the ‘Turla’ worm and the U.S. Army most serious computing hack in histo…

In 2008, a very powerful variant of the infamous ‘Agent’ worm hit local computing networks of the U.S. Army central command in the Middle East. It was classified as the worst computing hack in the history of the U.S. Army. Pentagon experts took 14 months to completely remove the malware from the military network. That […]

Finally! iOS 7 update against the wireless breach

New update for iOS 7, the operating system of iPhone and iPad, revealed the unprecedented scale of exposed passwords of hundreds of millions of users on wireless networks for more than year and a half! Users of Apple’s devices are used to a relatively high pace of updates, hence sometimes they wait a long time […]

Stop, thief! Introducing latest hacker tricks

You could say that computers and the Internet are with us long enough that we could be considered ‘understanding’. When we get an email telling us we won a million dollars or wants our bank details, we say “yeah right”, and dump it to the trash. Then yet how do we still fall into traps? […]

This girl could get you in trouble

What is common between Lily Collins, Britney Spears, Sandra Bullock, Adriana Lima, Katy Perry and Jon Hamm? Give up? I’ll give you a hint: All are more dangerous than you think. Those are the top ten searched celebrities on the web that if you look for various details about them, especially the kind of revealing […]

‘Bancos’ goes mobile

A new ‘Bancos’ style threat is trying to get the login information to your bank and steal money from you. The threat is a Trojan that currently threatens online banking users in Europe and Asia by presenting very reliable campaigns related to official organizations. The malware is luring the victims to install and run it […]

The ‘Holy Grail’ of hackers: SIM card security breach is threatening hundreds of millions users

A significant security breach in SIM cards was revealed, allowing attackers to take control over users’ phone and do whatever they please, without the user noticing. Up until now, security breaches were discovered in certain operating systems such as Android, iOS or Windows Phone. Now , it turns out that there are security holes that […]