A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you…
A critical vulnerability in the WebShot feature implemented by TimThumb plugin expose WordPress instance to Remote Code Execution attacks. The…
Security experts at Duo Security have discovered a serious flaw in the implementation of two-factor authentication which allow attackers to…
More than 32000 servers containing motherboards manufactured by Supermicro expose admin passwords in the clear, it is a godsend for…
Security experts at Zimperium firm revealed that LinkedIn users could be potentially vulnerable to Man-in-the-Middle attacks leveraging an SSL stripping.…
The popular hacker George Hotz, also known as Geohot, as releases a one click tool dubbed Towelroot to root Android…
The Italian security firm Tiger Security issued a report on the current state of cyber attacks against the organization of…
The American multinational giant AT&T confirmed to have suffered a data breach last April, personal data of an unknown number…
A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions…
Israeli researchers presented the air-gap network hacking technique to compromise a system, even if it is isolated from the Internet,…
This website uses cookies.