Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…
Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to…
US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law…
iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to…
The Hacked PayPal Users Reports System has been hacked by popular researcher Nir Goldshlager exploiting a flaw in a third-party…
“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was…
Yahoo Japan Corp is investigating on a possible data breach that may have exposed 22 million user IDs stolen during…
Bloomberg was the victim of an accident data breach, financial data and news service posted online more than 10,000 private…
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…
A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for…
This website uses cookies.