The General Data Protection Regulation (GDPR) governs the use and privacy of EU citizens’ data and the Data Protection Directive…
A coordinated operation of law enforcement agencies in 7 countries raided operators of darknets trading in illegal products and services.…
The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…
Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know…
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the…
A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still…
2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per…
Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution…
Cisco has released security updates for the products CISCO ACE 4710 appliance to fix a high severity command injection vulnerability.…
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor…
This website uses cookies.