Breaking News

Mobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical InfrastructureMobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical Infrastructure

Mobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical Infrastructure

IOACTIVE researchers warn that critical infrastructure mobile applications are being developed without secure coding compliance that could allow hackers to…

7 years ago
Game of Drones – Researchers devised a technique to detect drone surveillanceGame of Drones – Researchers devised a technique to detect drone surveillance

Game of Drones – Researchers devised a technique to detect drone surveillance

A group of Israeli researchers at Ben Gurion University have built a proof-of-concept system against surveillance operated a surveillance drone.…

7 years ago
Security issue in Intel’s Active Management Technology (AMT) allows to gain full remote access to corporate devicesSecurity issue in Intel’s Active Management Technology (AMT) allows to gain full remote access to corporate devices

Security issue in Intel’s Active Management Technology (AMT) allows to gain full remote access to corporate devices

Security researchers from F-Secure have discovered a new issue in Intel's Advanced Management Technology (AMT) implementation that can be exploited…

7 years ago
A flaw in macOS High Sierra allows to unlock the App Store Preferences without passwordA flaw in macOS High Sierra allows to unlock the App Store Preferences without password

A flaw in macOS High Sierra allows to unlock the App Store Preferences without password

Security expert discovered a new vulnerability in macOS High Sierra that could be exploited by users logged as admins to unlock the…

7 years ago
Is the INSCOM (U.S. Army Intelligence & Security Command) working on a PSYOPS software?Is the INSCOM (U.S. Army Intelligence & Security Command) working on a PSYOPS software?

Is the INSCOM (U.S. Army Intelligence & Security Command) working on a PSYOPS software?

The INSCOM (U.S. Army Intelligence & Security Command) is working on a software that could be used to monitor social media and…

7 years ago
Never too late, Skype supports end-to-end encryption for new Private Conversations featureNever too late, Skype supports end-to-end encryption for new Private Conversations feature

Never too late, Skype supports end-to-end encryption for new Private Conversations feature

It's official, Microsoft's Skype is rolling out a new feature called Private Conversations, which uses end-to-end encryption. The latest version of…

7 years ago
CSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malwareCSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malware

CSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malware

A new variant of the infamous Ursnif malware spread in the wild and adopts a new advanced evasion technique dubbed…

7 years ago
A security issue in WhatsApp potentially allows attackers to eavesdrop on encrypted Group chatsA security issue in WhatsApp potentially allows attackers to eavesdrop on encrypted Group chats

A security issue in WhatsApp potentially allows attackers to eavesdrop on encrypted Group chats

An attacker can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp, Threema and Signal messaging apps. Even…

7 years ago
Italian researcher discovered that Gmail shutdown after sending a Zalgo textItalian researcher discovered that Gmail shutdown after sending a Zalgo text

Italian researcher discovered that Gmail shutdown after sending a Zalgo text

Researchers at security firm We Are Segment have discovered a vulnerability in Gmail, a “distorted” message shuts down the most…

7 years ago
New Malware Dubbed LockPos Introduces New Injection Technique To Avoid DetectionNew Malware Dubbed LockPos Introduces New Injection Technique To Avoid Detection

New Malware Dubbed LockPos Introduces New Injection Technique To Avoid Detection

Security Researchers from Cyberbit have discovered a new malware injection technique being used by a variant of Flokibot malware named…

7 years ago