security

LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. Which is…

12 years ago

Apple iMessage vulnerable to MITM attack

Quarkslab researchers Cyril Cattiaux has revealed Apple lied when it claimed it could not intercept iMessages sent by its users.…

12 years ago

A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…

12 years ago

Serious WhatsApp flaw allows decrypting user messages

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. A…

12 years ago

Skorpion charger secure mobile while charging

Kaprica Security has presented the Skorpion charger, a smart device that is able to scan the handset for malware while…

12 years ago

How to create undetectable malware with Mac encryption mechanism

Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the…

12 years ago

New iOS 7 flaw allows attacker to hijack Apple ID through spoofing fingerprints

German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially…

12 years ago

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

12 years ago

Android Firefox browser app flaw allows data stealing from SD card

Vulnerability In Android Firefox browser app allows hackers to steal user's files from the SD Card And Firefox's Privately Stored…

12 years ago

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can…

12 years ago

This website uses cookies.