The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…
The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always…
An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and…
Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…
New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could…
Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…
A Pakistani hacker claimed responsibility for a data breach at Gaana music streaming service that exposed data of more than…
Security researchers at Trend Micro Security firm discovered that 1 in 20 Android apps open to attack due to a…
SAP Security experts discovered a number of unpatched vulnerabilities and weaknesses in Oracle PeopleSoft that could be exploited to obtain…
This website uses cookies.