Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New User? Register
Israeli researchers at Ben-Gurion University detailed a method, dubbed Brightness, to steal data from computers by capturing brightness video changes of the [...]
A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]
A new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code [...]
After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]
Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.