ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals…
Africa is becoming even more an "online continent" despite its economical difficulties, in the same time there is a growing…
iOS 7 vulnerability lets ill-intentioned with physical access to bypass iPhone's Lockscreen to access mobile. Jose Rodriguez has found a lock…
Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds…
Google might have the access to WiFi passwords of customers stored in Android mobile devices due a built-in feature in…
Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and…
Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack.…
It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official…
In an Irish court the FBI Supervisory Special Agent Donahue revealed that FBI had control of the Freedom Hosting company…
Imperva security researchers observed Web attacks involving PHP SuperGlobal variables are gaining popularity within the hacking community. Security researchers sounded the…
This website uses cookies.