A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for…
Experts that are monitoring the escalation of tension in Crimea recognized a military strategy similar to the one adopted in…
Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris…
Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber…
Russia Today media agency has been hacked by unknown attackers just after Putin's order to move troops to the Crimea…
F-Secure's Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of…
Vulnerability in Yahoo allowed Egyptian hacker to delete more than 1 million and half records from Yahoo database. Yahoo immediately…
Hold Security firm discovered more than 360 million newly stolen credentials and around 1.25 billion email addresses available for sale…
Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…
A team of researchers created in the lab the Chameleon WiFi virus, a malware that infects entire WiFi networks replicating…
This website uses cookies.