A hacker is offering for sale more than 32 million Twitter account credentials with plans to sell the account details…
Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing deliver a weekly report on issues in Syria and Iraq as well…
A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow…
China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications.…
New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case…
The μTorrent team announced its community μTorrent forum has been hacked. Hundreds of thousand records belonging its users have been…
The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s…
A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more…
The FTC’s chief technologist gets her mobile phone number hijacked, she shared her experience of a victim of such kind…
Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time…
This website uses cookies.