The Drupal team issued an update to fix a flaw that allows attackers reset password by crafting URLs under certain…
Despite principal vendors have released updates to fix the FREAK vulnerability many mobile apps for Android and Apple iOS are…
US health insurer Premera Blue Cross announced its network had been hacked, potentially exposing data from 11 million individuals. A…
DLL hijacking is not a prerogative for Windows systems, it is a common hacking technique that is very effective against…
71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report.…
DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…
Data exfiltration is mechanism to data breach that occurs when an individual’s or organization's data is illegally copied from its…
The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to…
A security researcher has discovered two different reflected file download flaws in Facebook that could be exploited to hit its…
The security expert Egor Homakov from Sakurity firm has released the Reconnect tool that allows hackers to hijack accounts on…
This website uses cookies.