Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target…
Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the…
A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…
Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal…
The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security…
Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers.…
The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the…
The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of Forbes and decided to disclose them for…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA…
This website uses cookies.