Posts

Bugs found in D-Link’s DIR-850L wireless AC1200 dual-band gigabit cloud routers which can be hijacked and taken control of.

Nearly all Android users should take action today and apply updates that are available to address this vulnerability.

Attackers accessed Social Security numbers, birth dates, addresses, and driver’s license numbers.

Windows kernel flaw has been present since Windows 2000, and is on Windows 10.

Six exploits in chipsets used by Huawei, Qualcomm, MediaTek and NVIDIA found in popular Android handsets, according to University of California computer scientists.

The S3 buckets, owned by BroadSoft, contained SQL database dumps, code, access logs, customer billing addresses, and phone numbers, belonging to clients Time Warner Cable (TWC).

Applicants were seeking employment with a private military contractor, TigerSwan, blaming a 3rd party recruitor, TalentPen LLC, for the leak.

We are often told that re-using passwords is dangerous. The idea is simple; if criminals steal your password from one website, they will try and use it on your other online accounts. This could be a really important account, like your email. We know we should use a different password for every online service. We also know that most […]

US .gov site was hosting a .zip archive containing JavaScript that with obfuscated PowerShell, downloading a gif file which is a Cerber executable.

Locky is notorious for its effectiveness and profitability. In the last two years, Locky has extorted almost $7.8 million from victims, according to a recent study by Google.