The Google Project Zero hacker James Forshaw assessed Windows 10 analyzing the big risks related with the new OS from…
A hacker belonging to the alleged group LulzSec has claimed responsibility for a DDoS attack that hit UK telecom TalkTalk…
Researchers demonstrated how disable the airbags on a Audi TT (and others models) and other functions by exploiting a zero-day…
How much cost a zero-day for an industrial control system? Where is to possible to buy them and who are…
Now that it is known a critical flaw in the Diffie-Hellman key-exchange protocol was exploited by the NSA to break…
Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of…
A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a…
Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes.…
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…
A trio of researchers has demonstrated that some versions of self-encrypting hard drives manufactured by the Western Digital are affected…
This website uses cookies.