This post is an excerpt from the article titled "Evolution of 3D Printing Technology Raises Security Concerns" available on the…
TrapX, a renowned security providing delivery of deception based cybersecurity defense uncovered a security flaw in medical field dubbed as medical device hijack,…
An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and…
Researchers have discovered a new TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks.…
The crash of the Airbus A400M military transport in Spain was caused by a software bug, three engines were shut…
The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities.…
Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine.…
The security expert Samy Kamkar after the disclosure of a method to easily crack many Master padlock combinations designed Combo…
Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS…
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends…
This website uses cookies.