Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against…
A developed has discovered that just visiting a page including an unicode string of 13 characters it is possible to…
At the Pwn2Own hacking competition two researchers hacked the four major browsers, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and…
China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest…
For the first time China has publicly admitted the existence in its military organization of special information warfare units. Since…
The Drupal team issued an update to fix a flaw that allows attackers reset password by crafting URLs under certain…
US health insurer Premera Blue Cross announced its network had been hacked, potentially exposing data from 11 million individuals. A…
DLL hijacking is not a prerogative for Windows systems, it is a common hacking technique that is very effective against…
Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to…
DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…
This website uses cookies.