On Tuesday, Adobe released updates for Flash Player, Shockwave Player, Captivate and Digital Editions addressing a total of 20 vulnerabilities.…
Researcher Luca Bongiorni has detailed the procedure to weaponize a new mouse with WHID Injector to show you how to…
Israeli cyber spies hacked into the operations of Islamic State bombmakers and discovered they were developing a laptop bomb to…
Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of…
Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…
Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…
Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark…
Security experts have discovered a critical kernel command line injection vulnerability in the Motorola handsets Moto G4 and Moto G5.…
DARPA is currently developing a multifactor authentication system that will replace the current common access card (CAC). According to a…
Security experts from Kaspersky confirmed that threat actors in the wild are exploiting the SambaCry vulnerability CVE-2017-7494 to spread a…
This website uses cookies.