A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a malware in just 10 seconds. The security researcher Axelle Apvrille revealed that ...
Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes. Bad news for network administrators, new atta ...
Wikileaks has obtained and immediately released the CIA Director John Brennan private emails. It is a first lot, others will be soon published. A few days ago a teen has violated the CIA Director ...
Updates released last week by Apple for Apple Productivity Apps fix a number of flaws that can be exploited for a number of attacks. Apple has recently released Keynote 6.6, Pages 5.6, Numbers 3.6, ...