The damage to users’ privacy that Facebook has caused may be irreparable; however, the company will implement some measures to try to...
Ethical hacking specialists affirm that a ransowmare infection has compromised the information of over 85k patients of the Grays Harbor Community Hospital,...
Thanks to some reports of service failures of the popular streaming platform Netflix, a group of vulnerability testing specialists has detected multiple...
It appears that threat actors have been working overtime in the most recent months, as new security incidents are known every day...
Antivirus solutions are one of the basic protection tools for computer users; however, this software is not safe from flaws that alter...
ATMs remain one of the favorite targets of multiple malicious users; especially in places where large numbers of these machines are concentrated,...
Wireless protocols are not exempt from cybersecurity risks. IT security audit specialists say that more than one billion Bluetooth-enabled devices (smartphones, IoT...
Last August 10, network security specialists revealed a cyberattack incident targeting one of the hospitals of the French health company Ramsay Health,...
Biometric records of more than one million people, in addition to other sensitive details, are exposed to any user’s reach in an...
Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are...
The implementation of cloud-based architecture has been promoted as a much more secure alternative than traditional networks, mentioning experts in vulnerability testing....
Security issues keep popping up for British Airways. Network security experts have revealed a flaw in the airline’s e-ticketing system that, if...
The data protection regulator in Greece has reported that the leading consultancy PriceWaterhouseCoopers (PwC) will be fined $170k USD for violations of...
A team of ethical hacking specialists from Eclypsium security firm has revealed a report describing a critical vulnerability present in the design...
Science fiction has set this scenario on multiple times: A scientist develops a machine that generates sounds capable of controlling minds, altering...
Extortion via the Internet has become a recurring problem for users with less knowledge or practices related to information security. In recent...
At the ongoing Defcon 2019, the 18-year-old Bill Demirkapi presented his findings after three years of research about a software deployed in...
A data breach incident has just been revealed at Air New Zeland airline that, according to network security experts, could have affected...
Today, any online service or application is exposed to some extent to cyberattacks that, depending on the capabilities of hackers, could lead...
Recent research by ethical hacking specialists from Check Point Research revealed the existence of dozens of vulnerabilities in a commonly used protocol...
The gamer community is not safe from cyberattacks, as there are multiple groups of malicious hackers that consider it a hunting territory...