Breaking News

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Hackers can compromise your WhatsApp account by tricking you into answering a video call, the company fixed the flaw in…

7 years ago

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber…

7 years ago

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Security firm Group-IB has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage…

7 years ago

Researchers presented an improved version of the WPA KRACK attack

Security researchers who devised last year the Key Reinstallation Attack, aka KRACK attack,  have disclosed new variants of the attack. Security…

7 years ago

Project Strobe, what will change after the Google security breach?

Google announced a security breach that may have exposed data of over 500,000 users of its Google+ social network, these…

7 years ago

BEC scams, hacked accounts available from $150 up to $5,000

Security experts from Digital Shadows have conducted an interesting study about the technique adopted by crooks to infiltrate company emails,…

7 years ago

How Secure Are Bitcoin Wallets, Really?

Purchasers of Bitcoin wallets usually have one priority topping their lists: security. What's the truth about the security of these…

7 years ago

Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it

This is a very bad news for Google that suffered a massive data breach that exposed the private data of over…

7 years ago

WECON PI Studio HMI software affected by code execution flaws

Security experts discovered several vulnerabilities in WECON's PI Studio HMI software, the company has verified the issues but has not…

7 years ago

Expert presented a new attack technique to compromise MikroTik Routers

Experts from Tenable Research have devised a new attack technique to fully compromise MikroTik Routers. MikroTik routers continue to be…

7 years ago

This website uses cookies.