Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM…
Confide App, the secure messaging app used by staffers in the White House and on Capitol Hill is not as…
A flaw in ESET Endpoint Antivirus is exploitable to get remote root execution on Apple Mac systems via Man-In-The-Middle (MiTM)…
A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users…
Google Chrome users beware, hackers are behind you. Users may be tricked into downloading malware masquerading as a fix for…
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for…
Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…
A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code…
Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for…
Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The…
This website uses cookies.