A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative…
Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in…
A study conducted by HP's Fortify on security features implemented by Smartwatches revealed that not even a single device found…
Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm…
A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks…
Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will…
Researchers have spotted a new strain of the Bartalex macro-based malware that is used to drop the Pony loader malware…
What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a…
The Outpost24 team has identified several vulnerabilities that affect Joomla HelpDesk Pro extension, the flaws can lead to remote code…
Facebook releases query packs for finding possible malware infection, including the malicious exploits used by the Hacking Team to hack…
This website uses cookies.