Find out why there is increased risk of hacking during Black Friday and Cyber Monday and learn how to remain…
Researchers from SEC consult analyzed more than 4000 firmware's embedded devices, where is included devices belonging to 70 vendors. The…
Dell is in the headlines for shipping PCs with a pre-installed trusted root certificate dubbed eDellRoot that opens users to…
A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is…
"Want to keep using the pacemaker? "" pay us 2 bitcoins" Experts fear that ransomware will start targeting medical devices.…
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I'm…
A flaw in certain D-Link switches can be exploited by remote attackers to access configuration data and hack corporate networks.…
Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is…
A Russian manufacturer has built an advanced system for the protection of any channels of telephone communication against wiretapping. The…
A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender…
This website uses cookies.