Security

European Union Websites plagued by SQL Injection FlawsEuropean Union Websites plagued by SQL Injection Flaws

European Union Websites plagued by SQL Injection Flaws

Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites…

9 years ago
Are you using EMC and VMware solutions? Watch out unauthorized accesses!Are you using EMC and VMware solutions? Watch out unauthorized accesses!

Are you using EMC and VMware solutions? Watch out unauthorized accesses!

EMC Data Domain OS and VMware NSX and vRealize are affected by security issues that could be exploited to gain…

9 years ago
A crafted PDF document can hack your Chrome PDF reader, Update Chrome now!A crafted PDF document can hack your Chrome PDF reader, Update Chrome now!

A crafted PDF document can hack your Chrome PDF reader, Update Chrome now!

A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow…

9 years ago
China ready to launch the first hack proof quantum communication satelliteChina ready to launch the first hack proof quantum communication satellite

China ready to launch the first hack proof quantum communication satellite

China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications.…

9 years ago
So You want to Capitalize on the IoT Business…So You want to Capitalize on the IoT Business…

So You want to Capitalize on the IoT Business…

The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s…

9 years ago
Fabrication-time Attacks and the Manchurian ChipFabrication-time Attacks and the Manchurian Chip

Fabrication-time Attacks and the Manchurian Chip

Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time…

9 years ago
Lenovo Accelerator Application contains a bug that allows remote hack of your PCLenovo Accelerator Application contains a bug that allows remote hack of your PC

Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code…

9 years ago
Iran orders media companies to store data in the countryIran orders media companies to store data in the country

Iran orders media companies to store data in the country

Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related…

9 years ago
Power plant ICS threatened by an easy remotely exploitable flawPower plant ICS threatened by an easy remotely exploitable flaw

Power plant ICS threatened by an easy remotely exploitable flaw

The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable…

9 years ago
CVE-2016-2107 OpenSSL Flaw still affects many Alexa Top SitesCVE-2016-2107 OpenSSL Flaw still affects many Alexa Top Sites

CVE-2016-2107 OpenSSL Flaw still affects many Alexa Top Sites

According to the security firm High-Tech Bridge many of the Alexa Top 10,000 websites are still vulnerable to the OpenSSL…

9 years ago