Breaking News

ROBOT Attack: RSA TLS crypto attack worked against Facebook, PayPal, and tens of 100 top domains

ROBOT ATTACK - Security experts have discovered a 19-year-old flaw in the TLS network security protocol that affects many software…

8 years ago

December Microsoft Patch Tuesday addresses 19 Critical browser issues

Microsoft released Patch Tuesday updates for December 2017 that address more than 30 vulnerabilities, including 19 Critical browser issues. Microsoft…

8 years ago

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number…

8 years ago

Adobe Patch Tuesday only addressed a moderate severity regression issue affecting Flash Player

Adobe released the Patch Tuesday, this month it only addressed a moderate severity regression issue affecting Flash Player tracked as CVE-2017-11305. It was…

8 years ago

Smart Shield Detector allows thieves to discover if the ATM is protected by anti-skimming technology

Crooks are now involving a small, battery-powered device dubbed Smart Shield Detector that is able to detect digital anti-skimming technology…

8 years ago

A collection of 1.4 Billion Plain-Text leaked credentials is available online

A 41-gigabyte archive containing 1.4 Billion credentials in clear text was found in dark web, it had been updated at…

8 years ago

Google Project Zero white hacker reveals Apple jailbreak exploit

White hat hacker Ian Beer of Google Project Zero has revealed an Apple jailbreak exploit that relies on a kernel…

8 years ago

The OceanLotus MacOS Backdoor Transforms into HiddenLotus with a Slick UNICODE Trick

Experts at Malwarebytes warns of a new variant of the macOS OceanLotus backdoor is using an innovative technique to avoid…

8 years ago

Microsoft accidentally exposed Dynamics 365 TLS certificates exposing sandbox environments to MiTM attacks

Microsoft accidentally exposed a Dynamics 365 TLS certificate and private key for at least 100 days leaving the sandbox environments…

8 years ago

10 Biggest Cyber Espionage Cases

Cyber espionage is now becoming more sophisticated and widespread both on the international and domestic stages. These are 10 Biggest…

8 years ago

This website uses cookies.