CUJO is a smart firewall that can connect to your home router via the RJ45 ethernet port. Its purpose is to keep...
Intel Security, soon to be rebranded as McAfee again, released on Wednesday a scanner that can identify hidden EFI firmware rootkits. Intel...
A new malicious application tries to disguise itself as the Google Chrome browser to fool victims into entering their payment card details....
Despite being marketed as a safe app, numerous flaws were discovered in its code, exposing user data. Secure messaging app Confide is,...
More than a third of the websites you visit online may include an outdated JavaScript library that’s vulnerable to one or more...
One of the Anonymous hackers who exposed the Steubenville High School rape case in 2012, was sentenced yesterday to two years in...
Over the last few years we have received a number of emails with attached Word files that spread malware. Now it seems...
Struts is an open source project of the Apache Foundation Jakarta project team, which uses MVC mode to help Java developers use...
Breach Affected About 24 U.S. Gas Station Stores, Payment-Terminal Maker Says. Major payment-terminal maker VeriFone Systems says that attackers managed to access its...
Nothing to fear, citizens. Keep consuming. Keep smiling. WikiLeaks has dumped online what appears to be a trove of CIA documents outlining...
Most expected WordPress 4.7.3 is now available for update. This security update covers six security issues that exists with WordPress version 4.7.2. Security issues:...
Another day, another important security update for WordPress. Oh boy. If you administer your own self-hosted WordPress website then your must update...
A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism implemented by the company. A flaw in the...
DOJ: “Disclosure is not currently an option.” Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal...
A vulnerability discovered by Google Project Zero security researchers and left without a patch by Microsoft received a temporary fix from third-party...
Millions of IT professionals all over the world want to get into the hot field of security, and Metasploit is a great...
HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a...
Samsung’s Secure Bootloader (S-Boot) for Android lies at the heart of Samsung’s chain of trust concept. An attacker who compromises S-Boot could...
Researcher Discover “A logic vulnerability” dubbed ReBreakCaptcha to bypassing Google’s reCAPTCHA fields which is using for prevent from robots and abusive scripts...
Short Bytes: The developers of BlackArch ethical hacking distro have released the new ISO images of their operating system. BlackArch Linux 2017-03-01 is now...
Nation-sponsored attackers targeted 26 specific accounts. Yahoo CEO Marissa Mayer said she’ll forgo her 2016 bonus and any stock award for this...