At the Virus Bulletin 2015 conference, the security researcher Oleg Petrovsky detailed methods that can be used to hack drones…
Virginia State Police (VSP) launched a project to test the resilience to cyber attacks of police cars (models 2012 Chevrolet…
A billion Android phones are vulnerable to Stagefright 2.0 flaws that could be exploited by attackers to execute malicious code…
The permanent movement of trajectories on cyberpolitics is transforming political discourse. Last 29th of September, cybernauts worldwide received a simple…
A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of…
The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems.…
Experts at Akamai discovered the Linux XOR DDoS Botnet, a malicious infrastructure used to run potent DDoS attacks against dozens…
The researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popularmulti-channel commerce platform Shopify. Shopify is a…
A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like…
A recent survey conducted by Grant Thornton global revealed that one in six businesses have experienced a cyber attack in…
This website uses cookies.