
Research conducted by Kaspersky showed that the zero-day flaw was based on the RLO (right-to-left override) Unicode method, which is generally used for coding languages written from right to left, such as Arabic and Heb…
Research conducted by Kaspersky showed that the zero-day flaw was based on the RLO (right-to-left override) Unicode method, which is generally used for coding languages written from right to left, such as Arabic and Heb…
New AndroRAT found, exploiting Rooting Vulnerability Trend Micro detected a new variant of Android Remote Access Tool (AndroRAT) (identified as ANDROIDOS_ANDRORAT.HRXC) that has the ability to inject root exploits to pe…
Winter Olympics website hacked The Pyeongchang 2018 Winter Olympics' website went down just before the event's Friday opening ceremony, thanks to a cyber-attack, and stayed down for about 12 hours. The outage left users…
Netgear Routers wonderable to be Hacked Netgear Routers Security firm Trustwave has disclosed the details of several vulnerabilities affecting Netgear routers, including devices that are top-selling products on Amazon a…
'Biggest Leak in History' : iPhone source code leaked Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and sec…
Fake tech support scam : Google Chrome users be Alert Tech support scams are increasingly hitting Windows users on the Google Chrome browser—even when it's been updated to the latest version. Tech support scams may use …
An e-mail has gone out from IBM about its Bluemix cloud: after next Tuesday, the SoftLayer APIs will no longer accept connections encrypted with the ancient TLS 1.0. It's not quite a surprise that the 1990s-era protocol…