Seagate NAS affected by a Remote Code Execution zero-day vulnerability

9 years ago

 A security expert discovered a Remote Code Execution zero-day vulnerability in Seagate Network Attached Storage (NAS) systems. A critical zero-day…

Facebook Policies and New Terms of Use Have Been under Scrutiny in Europe

9 years ago

A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns…

Indian Government bans third party email services, including Gmail and Yahoo

9 years ago

The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government…

Shadow Cloud Services a serious risk for Government Networks

9 years ago

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…

TorrentLocker campaign uses email authentication to tune the operations

9 years ago

The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect…

Twitter is tracking phone numbers to prevent trolls and abuses

9 years ago

Twitter announced that it is starting to track phone numbers of users as a measure to prevent abuses like the…

The transportation giant Uber discloses a Data Breach

9 years ago

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly…

FireEye Assessment of 7 Million iOS and Android Apps shows a disconcerting scenario

9 years ago

FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps.…

Cyber criminals target trading algorithms to steal related code

9 years ago

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms.…

Pharming attacks exploit default passwords to hack routers

9 years ago

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security…

This website uses cookies.