Data exfiltration is mechanism to data breach that occurs when an individual’s or organization's data is illegally copied from its…
The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to…
A security researcher has discovered two different reflected file download flaws in Facebook that could be exploited to hit its…
The security expert Egor Homakov from Sakurity firm has released the Reconnect tool that allows hackers to hijack accounts on…
Microsoft and Apple released security updates to fix the FREAK vulnerability recently discovered and affecting their products. FREAK is a…
Researchers at Google’s Project Zero have demonstrated how to exploit Rowhammer problem in DRAM to gain kernel privileges on Linux…
A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security…
A number of Western websites were hacked over the weekend, the sites were defaced with messages claiming the ISIS as…
A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any website’s domain…
The security firm Bluebox discovered a preinstalled malware, many malicious apps, and a series of security holes on the Xiaomi…
This website uses cookies.