Breaking News

Fiat Chrysler distributes the fix for flawed Jeep via mailed USB

The decision of Fiat Chrysler for providing a software update via Mailed USB is considered disconcerting for the security industry.…

11 years ago

A PayPal stored XSS vulnerability exposed users to hack

Security experts at BitDefender have discovered a PayPal stored XSS vulnerability that could be exploited by hackers run various attacks…

11 years ago

Mozilla Bugzilla accessed, private flaws compromised since at least 2014

Mozilla said that data stolen from its bug tracking system was used to attack Firefox users in the wild, but…

11 years ago

Fake recruiters on LinkedIn spy on security experts

Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A…

11 years ago

Some Uber ride data is publicly accessible through Google

Some Uber trip information is publicly accessible through simple Google queries, the set includes trip and user info, and home…

11 years ago

Barclays creates its own red team to attack its systems to find flaws

Barclays has created a red team to hack its own computer systems to discover and exploit security vulnerabilities before external…

11 years ago

Match com, millions online daters at risk due to a malvertising campaign

Malwarebytes has uncovered a new malvertising campaign targeting the Match.com 's ad network which has been breached by a malware…

11 years ago

New singular Android Ransomware relies on the XMPP protocol

A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers.…

11 years ago

Critical OS X flaw could be exploited to steal data from Keychain

Security researchers at MalwareBytes have discovered a new variant of an adware installer that is leveraging an old trick to…

11 years ago

Dark Web intelligence pro and cons

Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks?…

11 years ago

This website uses cookies.