A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any…
The CVE-2016-3862 flaw is a remote code execution vulnerability that affects the way images used by certain Android apps parsed…
The NSO Group is one of the surveillance companies that allow their clients to spy on their targets through almost…
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked…
In the aftermath of the DNC hack the staffers were instructed in the use of the popular instant messaging Signal…
Apple issued emergency iOS updates to patch three Zero-Days exploited by a government spyware in an high-sophisticated attack. Apple has…
Security experts from Kaspersky spotted a malware-based campaign that abused the Google Adsense Advertising network to spread a malicious code.…
Experts from Lookout revealed that all Android versions running the Linux Kernel 3.6 to the latest are affected by the…
Experts from Checkpoint have found four major vulnerabilities dubbed Quadrooter in Qualcomm chips that expose more than 900M Android users…
Hackers accessed Telegram accounts in Iran, a security duo investigated the security breach and will present its findings at the…
This website uses cookies.