A group of researchers from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already…
After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the…
A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the…
A security expert discovered a Remote Code Execution zero-day vulnerability in Seagate Network Attached Storage (NAS) systems. A critical zero-day…
The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly…
Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks…
SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive…
A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use…
The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The…
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…
This website uses cookies.