Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile's storage. Android is the open…
Sucuri firm detected a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect amplification vectors. The security…
The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user's traffic including access token.…
A Team of US researchers at UC Berkeley conducted a study on the HTTPS traffic analysis of ten widely used…
A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for…
Researchers at Team Cymru published a detailed report on a large scale SOHO pharming attack that hit more that 300,000…
Introduction to the article "Car Hacking: You Cannot Have Safety without Security" published by the Infosec Institute. Means, Methods and…
Russia Today media agency has been hacked by unknown attackers just after Putin's order to move troops to the Crimea…
Vulnerability in Yahoo allowed Egyptian hacker to delete more than 1 million and half records from Yahoo database. Yahoo immediately…
Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…
This website uses cookies.