According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the…
In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker…
Sergey Lozhkin, a security expert at Kaspersky Lab demonstratd how it is easy for hackers to compromise medical devices and…
A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…
Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…
A US magistrate ordered Apple to help unlock San Bernardino shooter's iPhone, be aware it is demanding a tool to…
A group of researchers discovered that roughly 1,000 brain wallets have been drained by cyber criminals that have stolen $103,000…
What happened to some of the APT groups behind clamorous cyber attacks? Why they don't go dark anymore after being…
A flaw affecting the Cisco Universal Small Cell devices allows unauthenticated remote users to retrieve devices' firmware, so Cisco urges…
This website uses cookies.