A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight…
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user…
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand…
SAP products make use of a proprietary implementation of LZC and LZH compression algorithms that could be exploited by attackers…
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our…
Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren't being publicly…
Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS…
The United States Secretary of Homeland Security explained that the terrorism has entered a "new phase" and fears an escalation.…
New PHP vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into…
This website uses cookies.