French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website…
The NSA used the twitter account to send an encoded message that has created the chaos on The Internet. The…
Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump.…
Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a…
Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting .lnk files.…
Covert Redirect vulnerability is the security flaw in the open standards for authorization OAuth and OpenID that is menacing IT…
Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The…
Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple's data protection mechanisms. Mobile…
Security Experts at Symantec discovered scammers are exploiting Facebook users' intention to hack friends' account to compromise their profile. Symantec…
Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems.…
This website uses cookies.