The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw…
Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small…
A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share…
The security expert David Longenecker discovered that the update process for ASUS Wireless Routers RT Series is vulnerable to Man-in-the-Middle…
A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was…
The part 6 of the Fappening archive is online, it includes image of Nicola Peltz, Krysten Ritter, Angie Miller, Aubrey…
The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded…
The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using…
A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by…
The US Government is working with manufacturers and vendors of medical devices and equipment to identify and fix vulnerabilities. Every…
This website uses cookies.