Malicious Hackers Can Exploit a Vulnerability in Magento to Access Credit Card DataResearchers have identified a serious vulnerability in Magento, the popular e-commerce platform...
Hi, what are you looking for?
Malicious Hackers Can Exploit a Vulnerability in Magento to Access Credit Card DataResearchers have identified a serious vulnerability in Magento, the popular e-commerce platform...
A security researcher was questioned by the FBI and banned from boarding a plane after he posted a message on Twitter about hacking into...
Netherlands-based security solutions provider Fox-IT today announced the launch of the company’s Cyberthreat Management Platform.The new context-driven threat intelligence solution is designed to help...
Verizon has released its 2015 Data Breach Investigations Report (DBIR). This year’s report is based on the analysis of more than 2,100 confirmed data...
Mojang Patches Bug After Exploit Is Made Public
SANS Institute researchers advise system administrators to update their Windows operating systems as soon as possible because one of the critical vulnerabilities patched by...
D-Link has failed to properly fix vulnerabilities affecting several router models, according to a researcher. The networking equipment manufacturer says it’s currently working on...
A high severity vulnerability has been found in Cache Cleaner, a Cisco Secure Desktop component that was deprecated by the company more than two...
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international...
Google has patched a vulnerability in YouTube that could have been exploited to copy any comment from one video to another, researchers revealed on...
Dropbox is the latest major company to turn to the power of the hacker community in an effort to ensure that its services are...
Various types of vulnerabilities have been identified in SearchBlox, the enterprise search solution built on top of Apache Lucene/Solr and Elasticsearch.