Security Affairs

Siemens warns of several flaws affecting Central Plant Clocks

Siemens disclosed several vulnerabilities in some of its SICLOCK central plant clocks, including ones that have been rated as “critical.”…

8 years ago

Rowhammer Evolves into RAMpage Exploit, Targeting Android Phones Since 2012

This week researchers demonstrated that most Android phones released since 2012 are still vulnerable to the RAMpage attack. In 2012,…

8 years ago

Iranian Charming Kitten ATP group poses as Israeli cybersecurity firm in phishing campaign

Iranian APT groups continue to very active, recently Charming Kitten cyber spies attempted to pose as an Israeli cyber-security firm that…

8 years ago

A Samsung Texting App bug is sending random photos to contacts

Some Samsung devices are randomly sending photos taken with the camera to contacts in the address book without permission. Do…

8 years ago

Facebook is notifying 800,000 users affected by a blocking bug

Yesterday the social network giant Facebook started notifying 800,000 users affected by a blocking bug. The company has already fixed…

8 years ago

The Social network giant Facebook confirms it shared data with 61 tech firms after 2015

On Friday, Facebook provided a 748-page long report to Congress that confirms the social network shared data with at least 61 tech…

8 years ago

Microsoft revealed that 2 Zero-Days found in March were part of a cyber weapon in an early development stage

Microsoft published technical details of 2 zero-days that have been recently discovered after someone uploaded a weaponized PDF file to…

8 years ago

NSA began deleting all call detail records (CDRs) acquired since 2015

NSA is deleting hundreds of millions of records of phone calls and text messages dating back to 2015 due to technical…

8 years ago

Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking

The maintainers of the Trezor multi-cryptocurrency wallet service reported a phishing attack against some of its users that occurred during…

8 years ago

RIG Exploit Kit operators leverage PROPagate Injection Technique to deliver Miner

FireEye reported the PROPagate code injection technique that was observed for the first time in a malware distribution campaign in…

8 years ago

This website uses cookies.