Late last year, we have featured here in Hackercombat.com the story about Marriot International Hotel chain data breach and the resulting accusation...
Many owners of software-faulted vehicles claim that these errors represent a decrease in their value According to cybersecurity and ethical hacking specialists...
The attackers claim that this time they have compromised hundreds of thousands of devices around the world, in what they themselves called...
2018 is not a good year for chip vendors, as they have not received any break when it comes to the continued...
A research report published by F-Secure has unearthed a new flaw that makes most of the devices including those that are equipped...
As revealed by Tech Crunch, the UK-based telecommunication firm EE, endured recurrent flaws in its online system. In one week, EE fixed...
Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT...
WhatsApp, the $19.3 billion mobile instant messaging platform acquisition of Facebook four years ago in 2014, has finally acknowledged the critical bug...
For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can...
Cybersecurity researchers have detected a couple of vulnerabilities in an IoT vacuum cleaner lineup that could let hackers spy on the victims,...
A survey was conducted by Outpost24 to identify the managing of cyber-security exposure. This survey was conducted at Infosecurity and around 250...
Pretty Good Privacy (PGP) and S/MIME Email encryption are affecting the users and it has been found that a new set of vulnerabilities...
Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires...
Abbott, the leading manufacturer of medical devices, releases a firmware upgrade that would fix cyber security vulnerabilities in certain cardiac devices. Health...
GitHub security alerts significantly reduced the time it takes for developers to remove vulnerabilities from their Ruby and JavaScript projects, says GitHub....
As per a recent study report, cyber attacks are now becoming the No. 1 risk to businesses, brands, operations and financials. It’s...
A Tinder user’s phone number- that’s all that a hacker could need, to take over the account itself, as per recent reports...
Phishing attacks are now very common; every one who uses the internet comes across phishing emails almost daily and it seems that...
Reports say that there has been a 31 percent increase in the number of software vulnerabilities in 2017 compared to 2016 and...
The Elon Musk’s giant solar battery in South Australia comes in as an exciting technology, and this was followed by the most...
Edward Roberts, Director of Product Marketing at Distil Networks, says “Many marketers assume website security is not their problem. However, as the stewards of...