The CYBERPOL announced a series of training programs that aim to educate both law-enforcement and cyber security officers (CSO). CYBERPOL announced today that it has refined CYBERPOL’s focus ar ...
The Linux GNU C Library (glibc) versions prior to 2.18 are affected by the GHOST remote code execution vulnerability present in the 'gethostbyname' function. A new critical vulnerability is threateni ...
The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape "ENISA Threat Landscape 2014." The European Union Agency for Network and ...
Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack the UAV with the malware Maldrone. The diffusion of drones is alerting go ...