It seems incredible, but as already happened for Skype it is possible to crash the latest version of Google Chrome…
The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He…
The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of…
The popular group of hackers dubbed w0rm breached the hacking forum "Monopoly" offering for sale all data present in its…
A Critical vulnerability affects Mozilla Bugzilla bug-tracking software could be exploited to access details of non-public vulnerabilities stored in its database. The…
Sucuri has noticed a spike in the number of compromised websites as part of a malware campaign which relies on…
Experts at Trend Micro uncovered the Operation Iron Tiger, a cyber espionage campaign carried out by Chinese hackers on United…
A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.…
The security researcher John Gordon has found an easy way to unlock smartphones running Android 5.0 and 5.1 (Build LMY48M).…
DARPA is sustaining researchers to seek innovations in software obfuscation solutions to contrast criminals that try to reverse engineer software.…
This website uses cookies.