Dropbox customers can now protect their accounts by using a USB device as the second factor in the two-step authentication (2FA) process.
Hi, what are you looking for?
Dropbox customers can now protect their accounts by using a USB device as the second factor in the two-step authentication (2FA) process.
Cisco has warned customers that hackers have been using stolen administrator credentials to install malicious software on networking devices running IOS.
Small devices installed in many automobiles allow remote attackers to hack into a car’s systems and take control of various functions, researchers have demonstrated.Researchers...
A vulnerability discovered in one of the subdomains of the official Salesforce website could have been exploited by malicious actors to take control of...
Mozilla announced on Tuesday that Firefox 40 is available for download. The latest version of the popular web browser adds support for Windows 10,...
Microsoft and Adobe released on Tuesday security updates to patch a large number of vulnerabilities in their products.
The developers of OpenSSH announced on Tuesday the availability of version 7.0. The latest release includes new features, security and bug fixes, and cryptography...
The developers of the Angler exploit kit have added support for a recently patched Internet Explorer vulnerability.
The Darkhotel advanced persistent threat (APT) group remains active. Researchers have uncovered this year new victims, new attack techniques, and new exploits.
Researchers at IBM have identified vulnerabilities that can be exploited by malicious Android applications to escalate privileges, allowing cybercriminals to take control of affected...
LAS VEGAS - DEF CON 23 - Shortly after researchers disclosed a series of vulnerabilities found in Tesla Model S, the electric car maker...
Use of SSL Prevents Hackers from Abusing Windows Server Update Services (WSUS)LAS VEGAS - BLACK HAT USA 2015 - Organizations that fail to configure...