The crash of the Airbus A400M military transport in Spain was caused by a software bug, three engines were shut…
DDoS attacks even more dangerous according to the last report published by Akamai Technologies, the "Q1 2015 State of the…
A new report published by Arbor Networks and the Ponemon Institute explains how Financial Service and Retail Organizations tackle advanced…
Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight…
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user…
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand…
SAP products make use of a proprietary implementation of LZC and LZH compression algorithms that could be exploited by attackers…
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our…
This website uses cookies.