CVE-2015-0240 is a critical security flaw in Samba that resides in the smbd file server daemon and can be exploited…
Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture…
A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related…
The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share…
Telephone DDoS attacks are on the rise, the criminal group known as “TNT” gang has released a new hardware tool…
DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are…
The Lenovo computer company knowingly shipped laptops with pre-installed Superfish malware. And 'controversy on the web, users are outraged. Lenovo…
The National Institute of Information and Communications Technology revealed that more than 25 billion cyberattacks hit systems in Japan during…
Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael…
Bio hacking - technology and humans have never been so close, they complement each other. But what are the security…
This website uses cookies.