Security

Google ProjectZero disclose details for three OS X 0days on Apple

Google ProjectZero disclosed the details of 3 new OS X zero-day vulnerabilities, but experts believe that they could be exploited…

11 years ago

Dotcom launches MegaChat for end-to-end encrypted audio and video communications

The entrepreneur Kim Dotcom has launched MegaChat, a new feature on Mega.nz that allows end-to-end encrypted audio and video communications.…

11 years ago

Schneider Electric SCADA Gateway contains Hard-Coded FTP Credentials

Narendra Shinde of Qualys Security has identified multiple vulnerabilities in Schneider Electric’s ETG3000 FactoryCast HMI Gateway. ICS-SCADA systems are critical…

11 years ago

Ubuntu patched several security vulnerabilities

Ubuntu has released several patches for security vulnerabilities in different versions of the OS, including some CSRF, DoS and remote…

11 years ago

Car hacking – Progressive Dongle exposes vehicles to attacks

A security researcher demonstrated that "car hacking" is reality through the exploitation of vulnerable Can Insurance Dongle. Million vehicles at…

11 years ago

Two flaws affect some version of the popular VLC media player

The VLC open-source media player is affected by two security vulnerabilities that can allow an attacker to run arbitrary code…

11 years ago

Verizon FiOS app flaw exposes 5 Million Customers’ accounts

Security expert discovered a critical flaw in Verizon's FiOS mobile app that could be exploited to access the email account…

11 years ago

American and Indian ICT experts to collaborate in strengthening India’s ICT

ICT experts from the US and India have now announced that they will work together to help improve India's ICT.…

11 years ago

Google Project Zero Discloses a third Windows flaw that Microsoft failed to fix

Google Project Zero team disclosed a new unpatched flaw affecting Windows 8.1 systems, the cyber security community is divided between…

11 years ago

Reading the ENISA Threat Landscape report for Internet Infrastructure

ENISA published a study on the on the threat landscape and provides a list of good practices that aim at…

11 years ago

This website uses cookies.