Researchers from the UNHcFREG (University of New Haven) is publishing on YouTube a series of videos to disclose vulnerabilities in…
De-Anonymize Google Users with new Timing Attack is possible, it is also possible identify Tor users if they’re logged in…
The CERT has published the results of its test conducted on popular Android applications that fail to properly validate SSL…
Apple CEO Tim Cook announced that the company will improve the security of its solutions, including iCloud, starting from extension…
Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak…
Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks…
Experts at Akamai-Prolexic discovered a botnet dubbed IptabLes and IptabLex that infects and exploits poorly-maintained Linux servers to run DDoS…
Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several…
An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad…
Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers…
This website uses cookies.