Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth.…
As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have…
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw…
Operation Distributed Dragons - Tiger Security firm has discovered a series of DDoS attacks from China and that appear as…
Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the…
Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…
Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion,…
Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be exploited to hack Voice over IP systems worldwide. The…
Experts at Akamai spotted a new malware kit named Spike which is used by bad actors to run DDoS attacks…
The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of…
This website uses cookies.