vulnerabilities

CISA shares a catalog of 306 actively exploited vulnerabilities

The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies…

2 years ago

Mac OS X is the software with most vulnerabilities in 2015

According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of…

8 years ago

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC…

8 years ago

DHS Information Security Program, Dozens secret databases vulnerable to hack

Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I'm…

8 years ago

Reading the Secunia Vulnerability Review 2015

Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key…

9 years ago

Black box attack, hacking an ATM with Raspberry Pi

The black box attacks are a new alarming trend in the criminal ecosystem, the experts Olga Kochetova and Alexey Osipov…

9 years ago

Nearly 7600 critical infrastructure vulnerable to bugs in Yokogawa App

Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa…

10 years ago

Secunia analyzed vulnerabilities in the Top 50 portfolio products

Secunia's Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The…

10 years ago

Crowd Sourced Formal Verification, find software bugs is a game

DARPA has launched the Crowd Sourced Formal Verification, it creates a set of games that search for software vulnerabilities involving…

10 years ago

Nir Goldshlager reveals how to hack Facebook Apps

The popular security expert Nir Goldshlager found  a serious vulnerability that allows attackers to post spoofed messages from any application…

11 years ago

This website uses cookies.