Breaking News

Lenovo warns of IBM Storwize shipped with infected initialization USB drivesLenovo warns of IBM Storwize shipped with infected initialization USB drives

Lenovo warns of IBM Storwize shipped with infected initialization USB drives

Some USB flash drives containing the initialization tool shipped with the IBM Storwize for Lenovo contain a malicious file. Some…

8 years ago
Turkey banned Wikipedia because its content web contents that represents a threat to national securityTurkey banned Wikipedia because its content web contents that represents a threat to national security

Turkey banned Wikipedia because its content web contents that represents a threat to national security

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to…

8 years ago
Hacker holds Netflix to ransom over new episodes of Orange Is The New BlackHacker holds Netflix to ransom over new episodes of Orange Is The New Black

Hacker holds Netflix to ransom over new episodes of Orange Is The New Black

The hacker 'The Dark Overlord' claims to have stolen and leaked online episodes from the forthcoming season of the TV…

8 years ago
Poorly designed apps leave millions of phones at risk of open port attackPoorly designed apps leave millions of phones at risk of open port attack

Poorly designed apps leave millions of phones at risk of open port attack

Security experts demonstrated that insecure mobile applications leave millions of smartphones at risk of open port attack. A group of…

8 years ago
Expert discovered online data belonging to the trading firm AMPExpert discovered online data belonging to the trading firm AMP

Expert discovered online data belonging to the trading firm AMP

Security expert Chris Vickery reported a data breach at online trading firm AMP that exposed customer credit reports, and Social…

8 years ago
FIN7 group has enhanced its phishing techniquesFIN7 group has enhanced its phishing techniques

FIN7 group has enhanced its phishing techniques

According to the experts from security firm FireEye, the financially-motivated FIN7 group is changing hacking techniques. The group that has…

8 years ago
Wikileaks revealed the Scribbles tool used by the CIA to mark documents and track whistleblowersWikileaks revealed the Scribbles tool used by the CIA to mark documents and track whistleblowers

Wikileaks revealed the Scribbles tool used by the CIA to mark documents and track whistleblowers

Wikileaks has published a new piece of the Vault 7 leak that details a CIA project codenamed Scribbles (a.k.a. the "Snowden…

8 years ago
Severe vulnerability in GE Multilin SR poses a serious threat to Power GridSevere vulnerability in GE Multilin SR poses a serious threat to Power Grid

Severe vulnerability in GE Multilin SR poses a serious threat to Power Grid

Security experts discovered a critical vulnerability in GE Multilin SR that poses a serious threat to the power grid worldwide.…

8 years ago
DOK malware, a stealthy MAC OS spyware that inspects your HTTPS TrafficDOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK Malware is a stealthy malicious code recently discovered by researchers at security firm CheckPoint, it affects almost ant Mac…

8 years ago
StringBleed SNMP Authentication Bypass affects numerous devices onlineStringBleed SNMP Authentication Bypass affects numerous devices online

StringBleed SNMP Authentication Bypass affects numerous devices online

Security researchers discovered an SNMP flaw dubbed StringBleed that affects several models of Internet-connected devices. Simple Network Management Protocol (SNMP) authentication bypass…

8 years ago