Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…
Researcher David Kirkpatrick discovered a flaw in older versions of NetSupport Manager could expose sensitive configuration settings and lead to…
Security researchers at UNH Cyber Forensics Research & Education Group have discovered a serious flaw in Viber messaging and voice…
The NIST announced it will request final public comments before Dual_EC_DRBG generator is officially removed from NIST Special Publication 800-90A,…
Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it's a question of time to assist a large-scale…
Reflession on the necessity to adopt a shared regulatory for the security of critical infrastructure. Eugene Kaspersky point of view…
A study conducted by experts at IOActive uncovered a variety of severe vulnerabilities in Satellite equipment widely used in numerous…
A new study conducted by the Ponemon Institute reveals the impact of successfully SQL injection attacks on organizations during the…
The presence of nearly 380 servers in the Tor Network, 12 percent of the exit capacity, running the vulnerable version of…
The demand for cyber security experts continues to raise, the US Government announced further investment to recruit new cyber talents…
This website uses cookies.