In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber g ...
Researchers at Check Point spotted a new family of Android malware dubbed CopyCat that infected 14 million devices and rooted 8 million of them. Researchers at Check Point’s Mobile Research Team ha ...
WikiLeaks leaked documents detailing BothanSpy and Gyrfalcon CIA implants designed to steal SSH credentials from Windows and Linux OSs. WikiLeaks has published a new batch of documents from the Vaul ...
Perl development team solved a flaw in DBD—MySQL in some configurations that wasn't enforcing encryption allowing an attacker to power MiTM attacks. The security researcher Pali Rohár reported an ...