Hackers are using a new search engine poisoning method to circumvent Google's page ranking-algorithms, the technique relies on PDF documents.…
Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can…
Researchers discovered several exploits in the data stolen from the Hacking Team, including ones for zero-day vulnerabilities. The recent hack…
Cisco Unified CDM software contains a privileged account with a static password that cannot be changed, by using it an…
Anonymous India hacked the BSNL Telecommunications Journal website and claims to have compromised more than 30 million records. The website…
The former Secretary of Defense William Cohen revealed that the US power grid is vulnerable to terror attacks, a major…
Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is…
Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target…
Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the…
A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…
This website uses cookies.