Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertis ...
Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these attacks? The FBI is investigating a series of mysterious physical att ...
Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that t ...
A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained th ...