The Long Term Evolution (LTE) mobile device standard is currently used by millions of users worldwide, all...
Vulnerability
According to bleepingcomputer reports, almost all Android devices since 2012 may be affected by a new vulnerability...
According to the newly disclosed report, cybercriminals are using mobile devices to avoid detection and execution of...
In November last year, a security researcher reported an arbitrary file deletion vulnerability to the WordPress security...
Recent researchers from the University of Texas in Austin, the Hebrew University of Jerusalem, and the Israel Institute...
Researchers at the system and network security department at Vrije Universiteit in Amsterdam said they found another serious...
According to Forcepoint security researcher John Bergbom, the upcoming WebAssembly standard may make some of the browser-level...
Schneider Electric recently fixed four vulnerabilities in U.motion Builder software, including two serious command execution vulnerabilities. Both Schneider...
The VDOO security research team published on Monday that over the past few months, they have been...
50,000 ships worldwide can be hacked, experts said. According to reports, cybersecurity experts recently demonstrated how easy...
Google developer, Jake Archibald discovered a severe vulnerability in several web browsers that reside in the way...
Security researchers report that malicious attackers are using a known vulnerability on D-Link routers and modems to create a Satori IoT botnet. Satori builds...
Canonical recently released microcode updates for all Ubuntu users who use AMD processors, focusing on the well-known...
On June 20th, local time, Cisco officially released a security notice that fixed several different levels of...
Last month, security researchers revealed that some hackers had discovered a new technology that can bypass the...