HackDig : Dig high-quality web security articles for hackers

How to Check CPU Temperature on Any Computer

When computers overheat it is typically due to the central processing unit (CPU) being too hot.  This can happen for a number of reasons such as lack of ventilation, dust or malfunctioning parts. If you begin to notice that your computer is hotter than normal, you will want to know how to check your CPU temp. Why Would You Need to Check CPU Temp? The CPU is
Publish At:2020-03-04 08:20 | Read:1163 | Comments:0 | Tags:Technology Tips CPU tips

More dangerous vulnerabilities in Intel CPUs

Intel  has released information about two potentially dangerous flaws in the processor architecture of its CPUs. The chip manufacturer had already provided security updates for similar gaps in May and November 2019. Although the new vulnerabilities seem to be less critical than the previous ones, side-channel attacks are still possible. The third Intel patch
Publish At:2020-02-04 09:15 | Read:1139 | Comments:0 | Tags:Business News CPU Germany intel

Oracle July 2017 Critical Patch Update addresses record-breaking 308 issues

Oracle just released the July 2017 Critical Patch Update (CPU) to address a total of 308 flaws in its solutions, it’s a record for the IT giant. Oracle issued its quarterly update, the July 2017 Critical Patch Update (CPU), that addresses 308 security vulnerabilities, 30 of them are rated as critical. This July 2017 Critical Patch Update (CPU) address
Publish At:2017-07-20 03:35 | Read:3150 | Comments:0 | Tags:Breaking News Hacking CPU Oracle

New GPU-based Linux Rootkit and Keylogger | Proof-of-concept GPU rootkit hides in VRAM, snoops system activities

  A team of coders have published a new “educational” rootkit, dubbed Jellyfish, that’s virtually undetectable by current software practices. Their work is designed to demonstrate that GPUs, which have become considerably more powerful and flexible over the past decade, are now capable of running keyloggers and rootkits. The world of hacking has becom
Publish At:2015-06-09 16:15 | Read:5819 | Comments:0 | Tags:Application Security Cyber Security Cyber Security Research

GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and
Publish At:2015-05-08 07:00 | Read:4017 | Comments:0 | Tags:Breaking News Malware Bitcoin CPU Demon GPU Jellyfish keylog