We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director…
The Italian model with regard to issues of cyber security and intelligence is in the process of evolution through a…
The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…
18 out of 276 vulnerabilities fixed by Oracle with the last Patch Update resides in the OIT libraries that are…
The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check…
DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and…
The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European…
Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…
Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option…
The researcher Dmytro Oleksiuk published details of ThinkPwn flaw, a UEFI zero-day that could be exploited by hackers to disable…
This website uses cookies.