It seems incredible, but as already happened for Skype it is possible to crash the latest version of Google Chrome…
The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He…
The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of…
The popular group of hackers dubbed w0rm breached the hacking forum "Monopoly" offering for sale all data present in its…
A Critical vulnerability affects Mozilla Bugzilla bug-tracking software could be exploited to access details of non-public vulnerabilities stored in its database. The…
Although Advanced Persistent Threats and Targeted Attacks are often confused, in their core these are two different things in the field…
A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.…
The security researcher John Gordon has found an easy way to unlock smartphones running Android 5.0 and 5.1 (Build LMY48M).…
Mandiant firm has spotted more than a dozen Cisco routers running malicious ROMMON firmware images that allow attackers to control…
A recent announcement issued by the Federal Bureau of Investigation warns customers that Internet of Things poses opportunities for cyber…
This website uses cookies.