Researchers at the last Black Hat Europe have presented the results of their research on DTM/FDT components, demonstrating the presence…
Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the…
A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…
ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…
Microsoft has released 8 security bulletins as part of October 2014 Patch Tuesday, it patches 3 Zero-day flaws actively being…
The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt…
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months.…
iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and…
The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…
FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to…
This website uses cookies.