Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered…
The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…
Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know…
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the…
The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The…
Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of…
The NSA tapped world leaders for US Geopolitical Interests, including a conversation between Netanyahu-Berlusconi over the U.S.-Israel Relations. A couple…
Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution…
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor…
Apple has begun developing security features for the new iPhone to make it impossible for the law enforcement agencies to…
This website uses cookies.