Breaking News

Amazon-owned grocery chain Whole Foods Market suffered payment card breach

News of the day is that another big company suffered a security breach, the victim is the Amazon-owned grocery chain…

8 years ago

Crooks hacked Microsoft servers to mine Monero, they earned $63K in 3 months

Experts from security firm ESET discovered cyber criminals exploiting Microsoft Servers to mine Monero and already earned $63,000 in 3…

8 years ago

FBI Director – Terrorists could launch drone attacks very soon

FBI director Christopher Wray warns of terrorists are planning to use drones in attacks, the threat is considered as imminent.…

8 years ago

‘Illusion Gap’ attack method bypasses Windows Defender and executes malware

Researchers have developed an attack method dubbed Illusion Gap for bypassing Windows Defender that will allow avoiding antivirus detection. Researchers…

8 years ago

Signal announces private contact discovery to improve users’privacy

Open Whisper Systems announced that it’s working on a new private contact discovery service for its popular communications app Signal.…

8 years ago

CISCO addressed several critical IOS flaws that expose devices to remote attacks

Cisco has released security updates for its IOS Operating System to fix more than a dozen critical and high severity…

8 years ago

iOS apps can access metadata revealing users’ locations and much more

Developer discovered that iOS apps can read metadata revealing users' locations and much more, a serious threat to our privacy.…

8 years ago

A high-risk two-years old flaw in Linux kernel was just patched

A high-risk security vulnerability discovered more than two years ago has been patched in Linux kernel. The flaw discovered by…

8 years ago

Google publishes PoC Exploit code for iPhone Wi-Fi Chip hack

Google disclosed details and a proof-of-concept exploit for iPhone Wi-Fi firmware vulnerability affecting Broadcom chipsets in iOS 10 and earlier.…

8 years ago

Experts analyzed an Advanced ‘all in memory’ CryptoWorm

The popular security expert Marco Ramilli shared the analysis of a cryptoworm having significant capabilities, enjoy the report! Introduction. Today…

8 years ago

This website uses cookies.