2015 awards - For the fifth year in succession the AV-TEST Institute is awarding firms that offered the most efficient…
Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by…
According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the…
In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker…
Sergey Lozhkin, a security expert at Kaspersky Lab demonstratd how it is easy for hackers to compromise medical devices and…
Members of the Anonymous group have stolen 18GB worth of data belonging to Turkey’s national police force and leaked it…
A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…
Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…
A US magistrate ordered Apple to help unlock San Bernardino shooter's iPhone, be aware it is demanding a tool to…
This website uses cookies.