On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor Network users with confirmation attack technique. Tor network is an excellent techno ...
Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has publicly revealed a series of flaws which affect major antivirus engines. The security researcher at Singapore-based co ...
Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered ...
CyberESI firm revealed that Chinese hackers members of the Comment Crew group violated the corporate networks of top Israeli defense companies. Once again a news refers of Chinese hackers, alleged ...