Detecting serious vulnerabilities in messaging applications September 18, 2021 288 Silvanovic stated that all of these vulnerabilities were fixed after she reported them. And one of its main reasons is…
Intel and AMD processors include new vulnerabilities May 7, 2021 293 Researchers at the University of Virginia and the University of California at San Diego have discovered new Specter vulnerabilities that…
Long-known Vulnerabilities in High-Profile Android Applications November 22, 2019 345 Hundreds of popular Android apps for mobile devices still contain vulnerabilities that allow remote code execution even if updated by…
Only five of the leading providers account with about a quarter of the vulnerabilities August 26, 2019 658 The report also reveals that to date, only five of the leading providers account for 24.1% of the vulnerabilities revealed…
Google have identified six vulnerabilities in Apple’s iOS July 30, 2019 442 Google security researchers have identified a total of six vulnerabilities in Apple's iOS operating system, one of which Apple has…
Walmart faces Chinese criticism over cybersecurity January 10, 2022 301 Chinese authorities have criticized Walmart for allegedly violating cyber security laws, local media reported, in the latest problem for a…
Predictions of the most important technologies that will thrive in 2022 January 5, 2022 355 Here are our predictions for the most important technologies that will thrive in 2022 that don't include flying cars!
Microsoft patches malicious Office file exploits September 17, 2021 406 Microsoft patches exploit vulnerabilities in Windows and other components such as Azure, Office, BitLocker and Visual Studio, including an actively…
Thousands of routers are under attack globally August 25, 2021 380 Routers are one of the most important devices in any home or office.
API attack traffic has increased by over 300% in the past 6 months July 30, 2021 122 Over the past six months, overall API traffic has grown 141%, but over the same period, API attack traffic has…