US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty…
In Israel there is an advanced cyber security industry, based mostly on veterans from two intelligence units, the cyber labor…
The Google Project Zero hacker James Forshaw assessed Windows 10 analyzing the big risks related with the new OS from…
Cyber Security Expert Mikko Hyppönen worries about cyber terrorists belonging to the Islamic State (ISIL or ISIS) have a credible…
A hacker belonging to the alleged group LulzSec has claimed responsibility for a DDoS attack that hit UK telecom TalkTalk…
Now that it is known a critical flaw in the Diffie-Hellman key-exchange protocol was exploited by the NSA to break…
Joomla just released a patch to fix a critical vulnerability that can allow an attacker to get full administrative access…
Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of…
The ISACA study "2015 Advanced Persistent Threat Awareness-Third Annual" tries to uncover information security professionals’ understanding of APT threats. A…
Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes.…
This website uses cookies.