At the beginning of November 2018, it was revealed that Chinese drone company DJI had exposed users to a serious vulnerability. The vulnerability, according to a Forbes’ report about the…
Read MoreAt the beginning of November 2018, it was revealed that Chinese drone company DJI had exposed users to a serious vulnerability. The vulnerability, according to a Forbes’ report about the…
Read MoreWeb developers today wide elbow room when it comes to developing their sites, as we enter the age of modern Javascript-engine browsers capable of Web Assembly, WebGL 2.0 and advance…
Read MoreFor decades, malware, especially those that can be considered as ‘weaponized’ have been proven developed by state-actors. State-actors are country-hired hackers, with the purpose of developing weaponized software in order…
Read MoreThousands of websites were impacted when Daniel’s Hosting, the prominent Dark Web hosting provider was hacked recently. As per reports, Daniel’s Hosting was hacked this week and taken offline, which…
Read MoreFacebook has silently patched a vulnerability very recently that enabled 3rd party sites to extract user information without seeking the consent of individual users first. The aggregate data extraction includes…
Read MoreWhat we can consider as the Olympics-of-White-Hat-Hackers, Pwn2Own hacker competition hosted by TrendMicro in Tokyo, Japan, has given away $325,000 in rewards for the group of hackers for this year’s…
Read MoreAccording to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data protection. They say a malicious expert with direct…
Read MoreJust like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…
Read MoreVulnerability scanning is not rocket science; anyone with the time in their hands to search for a software vulnerability scanner can find one in mere seconds. With the way the…
Read MoreComputer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation of high-profile computer viruses and worms that have…
Read More