The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered…
A group of experts has conducted a research that demonstrates the type of data that can be gathered through the…
Nearly 18,000 Android apps built using the Taomike SDK, and used in China, have been found to include a malicious…
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…
The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,”…
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of…
McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for…
Google listens and records our voice searches, but the majority of the users ignores it. I'll explain how to listen…
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A…
Don’t throw away your old Boarding Pass, it may contain personal information that could allow attackers to run targeted attacks…
This website uses cookies.