A flaw in certain D-Link switches can be exploited by remote attackers to access configuration data and hack corporate networks. The independent security researcher Varang Amin and the chief architec ...
An Israeli company named "L7 Defense" is trying to do the impossible - to stop application layer DDoS attacks in seconds instead of hours. It wants to do so by using an automatic protection system ba ...
Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important softwa ...
Hackers of the anti-Terrorism group Ghost Security Group have discovered ISIL militants had a bitcoin address containing 3 Million Dollars. We have been dismayed by the recent Paris attacks, fea ...