Zero-day software vulnerabilities – security holes that developers haven’t fixed or aren’t aware of – can lurk undetected for years,…
Browsing: Malware and Vulnerabilities
LONDON. Global cyber-security company, Kaspersky Lab, today announces the launch of two threatening yet provocative scents. Threat de Toilette pour femme and pour homme are…
According to the recent Wikileaks documents, British spy agencies worked with the CIA to turn televisions and smart phones into…
On Tuesday, 7th March, WikiLeaks published thousands of documents. The documents are alleged to show tactics and tools employed to, among…
Unit 42, Palo Alto Networks threat intelligence research arm, has recently observed attacks against multiple Middle Eastern government organizations using a…
Summary: Small businesses are generally not well secured due to being labeled as small businesses, but their security threats are…
ESET researchers have observed an increased number of apps on Google Play using social engineering techniques to boost their ratings,…
Independent researchers have uncovered a major vulnerability in many Dahua products, allowing remote unauthorised admin access via the web. The researchers…
Brian Krebs reported that credit and debit card payments giant Verifone is investigating a breach of its internal computer networks that…
WikiLeaks has published a huge trove of what appear to be CIA spying secrets. The files are the most comprehensive release…