The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a…
The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to…
Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. The malware was distributed…
New attack by Anonymous Italy: personal data from ministries and police have been released online. The site of Fratelli d’Italia,…
Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens…
Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast…
A security researcher has found a serious vulnerability in a building automation product from Sauter AG that could be exploited to steal…
USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…
PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the…
Apple has implemented a new feature to protect the privacy of its MacBooks users aimed at preventing malicious software from spying on…
This website uses cookies.