Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new…
The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded…
The National Institute of Standards and Technology is warning of the presence of a Zero-Day flaw in the Samsung FindMyMobile…
The security firm AdaptiveMobile has discovered a new variant of Koler ransomware is capable of self-replication via SMS messages. A…
The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using…
A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by…
The US Government is working with manufacturers and vendors of medical devices and equipment to identify and fix vulnerabilities. Every…
Security researchers at Rapid7 have discovered a serious NAT-PMP Protocol vulnerability that puts 1.2 Million SOHO routers at risk. Another…
Trend Micro discovered a cyber-espionage operation dubbed Operation Pawn Storm, which is targeting military, government and media entities worldwide. A…
Unknowns have hacked the NFC based electronic payment system used in Chile, the "Tarjeta BIP!", spreading an Android hack that…
This website uses cookies.