Hack the Air Force 2.0 uncovers over 100 vulnerabilities –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: zdnet The second Hack the Air Force bug bounty challenge, Hack the Air Force 2.0, has resulted...

iPhone Has a Killer Character Problem, and It’s Kicking Apple’s Brand –

If you have an iPhone, better be careful about any text your apps display. A new iOS bug discovered earlier this week by engineers at Aloha Browser will crash your Apple device, whether an...

Skype can’t fix a nasty security bug without a massive code rewrite –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: zdnet A security flaw in Skype’s updater process can allow an attacker to gain system-level privileges to...

Infrastructure protection in the US receives boost from increased funding

The US Government is forming a new office within the Department of Energy (DOE)...

Peter Wilson Joins Blockchain as VP of Engineering

Today I am thrilled to welcome Peter Wilson to Blockchain as our first VP of Engineering. His record of leadership and innovation at some of the fastest growing companies in...

Thales report highlights growing concern about data breaches

Organizations from various industries across the globe are increasingly hip to the magnitude of...

Innovative and rougher in extortion, threats continued for Android in 2017

2017 was without a doubt the year of ransomware. Users and businesses worldwide had...

Intel Bug Bounty Program Rewards $250,000 for Critical vulnerabilities

Intel Bug Bounty Program launched starting from March 2017 to collaborate with researchers and to mitigate the risk of exploitation. The Bug bounty program is open to all, any security...

Safe around your smart TV? Don’t be so sure about that

The times when all that our TV sets could do was show us ‘regular’...

Patches released by Microsoft to tackle over 50 security vulnerabilities

This week saw the second Tuesday of the month, and everyone who is responsible...

LATEST NEWS

MUST READ