Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the…
Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET…
Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by…
Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging…
The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is…
The notorious crime forum Sh0ping[.]su has been hacked by unknowns that leaked online credit card data and stolen accounts. Data…
More than 19 months after its public disclosure the CVE-2014-3704 is still exploited in attacks against Drupal-based websites. It was…
A group of Israeli researchers demonstrated how to steal RSA encryption keys through a PC's noises during cryptographic operations. If…
GhostShell is back and leaked 36 million records from vulnerable networks to invite experts to pay attention to the new…
Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company…
This website uses cookies.