Security Affairs

How the CIA is working to break the security of Apple devices

A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security…

11 years ago

Is Bio hacking a security risk? The future is now!

Bio hacking - technology and humans have never been so close, they complement each other. But what are the security…

11 years ago

Exploiting Vulnerabilities in WordPress plugins, a cybercrime trend

A serious vulnerability in the FancyBox Wordpress plugin makes it easy for a hacker to compromise any website based on…

11 years ago

Unknown hackers hit Gas Pump Monitoring Systems in the US

Researchers from Trend Micro discovered that unknown hackers have compromised  Gas Pump Monitoring Systems in the US ... it's security…

11 years ago

Risks related to the use of digital certificates

A recent report published by experts at Kaspersky Lab revealed that the number of abuses for digital certificates is in…

11 years ago

Critical DNS hijacking flaw affects D-Link DSL router

Critical DNS hijacking flaw affects D-Link DSL router, the flaw affects the ZynOS firmware that is used also by other…

11 years ago

Java poses the biggest security risks to PCs in US

According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security risks to Desktop…

11 years ago

Cyberpol education is the key solution to fighting any global cyber crime

The CYBERPOL announced a series of training programs that aim to educate both law-enforcement and cyber security officers (CSO). CYBERPOL…

11 years ago

Topface data breach – 20 Million records exposed

Topface, the Russian-based dating site, has been hacked, User names and e-mail addresses of 20 million visitors are offered for…

11 years ago

Google account hijacking via exploitation of XSS flaw

Security Expert Brett Buerhaus has discovered a critical flaw  on admin.google.com, which could be exploited by to Hijack an account…

11 years ago

This website uses cookies.