Researchers show how to clone Tesla S Key Fobs in a few seconds

8 years ago

Researchers demonstrated that it is possible to rapidly clone the wireless key fob of the expensive Tesla Model S and possibly…

Adobe Patch Tuesday for September 2018 fixes 10 flaws in Flash Player and ColdFusion

8 years ago

Adobe Patch Tuesday updates for September 2018 address a total of 10 vulnerabilities in Flash Player and ColdFusion, the good…

MageCart crime gang is behind the British Airways data breach

8 years ago

An investigation conducted by researchers at RiskIQ revealed that the responsible of the British Airways data breach is a crime gang tracked…

Trend Micro Apps removed from Mac App Store after being caught exfiltrating user data

8 years ago

Several anti-malware apps developed by Trend Micro have been removed from the Mac App Store because they were harvesting users'…

Zerodium disclose exploit for NoScript bug in version 7 of Tor Browser

8 years ago

Zero-day broker Zerodium has disclosed a NoScript vulnerability that could be exploited by attackers to execute arbitrary JavaScript code in the Tor Browser.…

Other 3,700 MikroTik Routers compromised in cryptoJacking campaigns

8 years ago

Thousands of unpatched MikroTik Routers are involved in new cryptocurrency mining campaigns. The exploit code for the CVE-2018-14847 vulnerabilities is…

Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks

8 years ago

Security experts observed the LuckyMouse APT group using a digitally signed 32- and 64-bit network filtering driver NDISProxy in recent…

GAO Report shed the lights on the failures behind the Equifax hack

8 years ago

A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack. The Equifax hack…

Mirai and Gafgyt target Apache Struts and SonicWall to hit enterprises

8 years ago

Security experts with Unit 42 at Palo Alto Networks have discovered new variants of the Mirai and Gafgyt IoT malware…

A growing number of iOS apps collect and sell location data

8 years ago

A growing number of iOS apps currently collect location data, WiFi network IDs and other data, from iPhone users and sell…

This website uses cookies.