Which are the usernames and passwords used by hackers when they scan the internet indiscriminately? Give a look to the…
A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with…
Researchers at Bluebox Security discovered that the badge scanning application used at the RSA Conference 2016 includes a hardcoded default…
Hack the Pentagon - DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources…
Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered…
The federal magistrate Judge James Orenstein has ruled in favor of Apple, rejecting the FBI request to unlock an iPhone.…
A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it?…
The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…
Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know…
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the…
This website uses cookies.