A research team from the Tencent firm discovered several security vulnerabilities in BMW models. Tencent Keen Security Lab’s information security experts found 14 vulnerabilities...
A recent investigation revealed six vulnerabilities in Dell EMC RecoverPoint devices. One of the flaws found allows attackers to execute remote unauthenticated...
A team of experts from Eclypsium presented a new variation of the Spectre attack, which allows attackers to recover the data hosted...
In an unusual case someone managed to develop a malware attack that, with one click, exploits separate zero-day vulnerabilities in two different...
SQL (Structured Query Language) is a popular programming language for managing data kept in relational databases. However, the databases can be breached...
In May, security experts found vulnerability in the LocationSmart website that allowed, without authentication, to obtain the real-time location of cell phones...
The professionals explain that DNSBin is a tool used to test the filtering of data through DNS and helps to test vulnerabilities...
A joint work of Chinese and American information security professionals found a new method to attack smart personal assistants like Amazon Alexa...
Red Hat recently announced a severe vulnerability in its DHCP client, CVE-2018-1111 could be exploited by malicious actors to execute arbitrary commands...
Recently, Lenovo released security patches for the CVE-2017-3775 high-severity vulnerability in the Secure Boot function on System x servers. Information security researchers commented...
A team of information security experts released a warning about a group of vulnerabilities that affect users of PGP and S / MIME. EFF...
In late April, two security companies (Qihoo360 and Kaspersky) independently discovered a zero-day for Internet Explorer (CVE-2018-8174), which was used in targeted attacks for...
Just a couple of months ago, an information security expert, nicknamed LANDAVE or Dave, found security vulnerability in the 7-Zip utility. A...
LG recently patched two critical vulnerabilities on the default keyboard of all its smartphones, including flagship phones; the vulnerabilities could have been...
Vulnerability in Drupal CMS turned popular websites into Monero Mining Platform. The criptockacking is becoming a plague that affects consumers around the...
A new security flaw uncovered in Office 365 dubbed baseStriker puts 100 Million Email Users at risk. With this vulnerability, attackers can...
Companies involved in the manufacture of CPU chips are facing a new wave of Spectre speculative execution vulnerabilities, which could be revealed...
Security Researchers discovered 8 new Spectre level critical Vulnerabilities in Intel CPU’s which is named as “Spectre Next Generation (Spectre-NG)” and each has...
Less and less computer security professionals, use anti-virus programs nowadays. This is primarily due to the gradually decreasing level of protection provided...
JavaScript based GLitch pwns browsers by flipping bits inside memory chips. Over the past few years, there has been a steady evolution...
As has been happening, the problems with the mitigations for the Meltdown fault continue. Recently, information security professional has shown that the Meltdown patch...