Breaking News

AV-TEST 2015 AWARDs – Which is the best antivirus solution?

2015 awards - For the fifth year in succession the AV-TEST Institute is awarding firms that offered the most efficient…

10 years ago

Comodo Internet Security opened your PC to attackers

Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by…

10 years ago

Tens of thousands of DVRs exposed on Internet with Hardcoded Passwords

According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the…

10 years ago

A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…

10 years ago

VXE Flaw allowed threats to bypass FireEye detection engine

Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker…

10 years ago

Researcher hacks medical devices and the whole hospital with ease

Sergey Lozhkin, a security expert at Kaspersky Lab demonstratd how it is easy for hackers to compromise medical devices and…

10 years ago

Anonymous leaked 18GB of data belonging to the Turkish national police

Members of the Anonymous group have stolen 18GB worth of data belonging to Turkey’s national police force and leaked it…

10 years ago

GCHQ helped US in developing Stuxnet, claims a documentary

A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…

10 years ago

Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal

Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…

10 years ago

US Judge requests Apple to unlock San Bernardino shooter’s iPhone

A US magistrate ordered Apple to help unlock San Bernardino shooter's iPhone, be aware it is demanding a tool to…

10 years ago

This website uses cookies.