Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…
Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed…
Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to…
Security expert Ebrahim Hegazy has found a Password disclosure vulnerability in Barracuda update servers which allows to gain access to…
Brute forcing applications spotted in the wild demonstrates the continual interest of cybercrime ... What is the limitations of this attack…
The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…
Adoption of a two-factor authentication process is necessary to increase the robustness for authentication processes, but security is a process…
Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones…
Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do…
In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits that allow to the attackers…
This website uses cookies.