Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand…
SAP products make use of a proprietary implementation of LZC and LZH compression algorithms that could be exploited by attackers…
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our…
Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren't being publicly…
Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS…
The United States Secretary of Homeland Security explained that the terrorism has entered a "new phase" and fears an escalation.…
New PHP vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of…
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends…
This website uses cookies.