Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of…
A team of experts showed that a simple sticker attached on a sign board can confuse any self-driving car and potentially…
Cyber gang demands HBO CEO to pay multimillion-dollar ransom to avoid 1.5TB of shows and confidential corporate data being leaked…
Many times we have seen in movies hackers and spies breaking electronic locks with any kind of electrical equipment. Is…
Mozilla Send service allows users to make an encrypted copy of a local file, store it on a remote server,…
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure triggering flaws found…
Episode 4 of the fantasy drama Game of Thrones season 7, 'The Spoils Of War', has been widely shared online…
The US Army has ordered its units to stop using Chinese DJI drones because of "cyber vulnerabilities" in the products.…
Yesterday the judge approved to release the researcher Marcus Hutchins on bail for a bond of $30,000 under certain conditions.…
Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet…
This website uses cookies.