GMR-2 issues allow satellite phone communications decryption in near real-time

9 years ago

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two…

UK Police: Accessing the Darkweb could be a sign of terrorism

9 years ago

In a leaflet distributed by the UK authorities, the police tell citizens to be vigilant on anyone using the darkweb.…

Hard Rock and Loews hotel chains notified guests of security breaches

9 years ago

Hard Rock and Loews hotel chains notified guests of security breaches, the incidents are linked to hack of the SynXis…

Mondelez International and Reckitt warn of economic impact of cyber attack on sales

9 years ago

Cyber attacks could have a significant impact on businesses, Mondelez International and Reckitt warn of NotPetya effect on the sales.…

The author of the original Petya ransomware released the master key

9 years ago

The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt…

BroadPwn potentially expose to hack millions of Android devices using Broadcom Wi-Fi Chip

9 years ago

Google warned of a serious flaw dubbed BroadPwn in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices.…

Tips to Stay Secure on Summer Vacations

9 years ago

In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security…

CopyCat Android malware infected 14 Million devices and rooted 8 Million

9 years ago

Researchers at Check Point spotted a new family of Android malware dubbed CopyCat that infected 14 million devices and rooted…

Wikileaks: BothanSpy and Gyrfalcon CIA Implants steal SSH Credentials from Windows and Linux OSs

9 years ago

WikiLeaks leaked documents detailing BothanSpy and Gyrfalcon CIA implants designed to steal SSH credentials from Windows and Linux OSs. WikiLeaks has…

Perl devs fix an important flaw in DBD—MySQL that affects encryption between client and server

9 years ago

Perl development team solved a flaw in DBD—MySQL in some configurations that wasn't enforcing encryption allowing an attacker to power…

This website uses cookies.