Yahoo awarded $7,000 to the bug hunter Michael Reizelman, aka mishre, for Flickr account hijacking vulnerability. Reizelman was a popular bug hunter…
A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as…
Luca Bongiorni was working on a cheap and dedicated hardware that he could remotely control (i.e. over WiFi or BLE),…
Some USB flash drives containing the initialization tool shipped with the IBM Storwize for Lenovo contain a malicious file. Some…
The hacker 'The Dark Overlord' claims to have stolen and leaked online episodes from the forthcoming season of the TV…
Security experts demonstrated that insecure mobile applications leave millions of smartphones at risk of open port attack. A group of…
According to the experts from security firm FireEye, the financially-motivated FIN7 group is changing hacking techniques. The group that has…
Wikileaks has published a new piece of the Vault 7 leak that details a CIA project codenamed Scribbles (a.k.a. the "Snowden…
Security experts discovered a critical vulnerability in GE Multilin SR that poses a serious threat to the power grid worldwide.…
DOK Malware is a stealthy malicious code recently discovered by researchers at security firm CheckPoint, it affects almost ant Mac…
This website uses cookies.