Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…
Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…
Security researchers at Trend Micro Security firm discovered that 1 in 20 Android apps open to attack due to a…
SAP Security experts discovered a number of unpatched vulnerabilities and weaknesses in Oracle PeopleSoft that could be exploited to obtain…
Marauder’s Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook…
Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal…
A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to…
Iran - The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack originated from US against the…
An Eagle High School student may be charged with a felony after being accused of a cyber attack on the…
Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth…
This website uses cookies.