Security

The GHOST vulnerability is a threat to critical business applications

Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden 'gethostbyname' function. GNU…

11 years ago

Samsung SmartTV models transmit voice, and more, to a third-party service

Samsung SmartTV transmits data to a third party, be aware that if your spoken words include personal or other sensitive…

11 years ago

11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful…

11 years ago

Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and…

11 years ago

Black box attack, hacking an ATM with Raspberry Pi

The black box attacks are a new alarming trend in the criminal ecosystem, the experts Olga Kochetova and Alexey Osipov…

11 years ago

CYBERPOL CALLS ON GOOGLE TO TAKE DOWN HARMFUL CONTENT

CYBERPOL Organization urges a joint effort between private firms and law enforcement to remove illegal and harmful content from the…

11 years ago

Severe XSS flaw affects fully patched Internet Explorer

Security experts discovered a new severe XSS flaw affects fully patched Internet Explorer and exposes users to risks of attacks…

11 years ago

Cybercrime – UNICRI study analyzed risks for the economy and enterprises

UNICRI published a study on the impact of the cybercrime on the economy in the Europen region with a specific…

11 years ago

BMW fixes security flaw in 2.2 million car software

A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars.…

11 years ago

PHP Applications and WordPress exposed to the Ghost flaw

PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting…

11 years ago

This website uses cookies.