Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their…
Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution.…
Thousands of users of the Microsoft searchable Docs.com service have inadvertently exposed passwords and other private information on the Internet.…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have…
Metasploit RFTransceiver extension implements the Hardware Bridge API that will allow organizations to test wireless devices operating outside 802.11 spec.…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
Danish-speaking users were infected by malware spread through Dropbox, but the company quickly adopted the countermeasures to stop the attack.…
This website uses cookies.