Quantum cryptography ‘is vulnerable to attack’
Quantum cryptography, considered to be one of the most complex and unbreakable methods of encryption, has been found to be vulnerable to attack, according to a major new study. PublishedRead More →
Quantum cryptography, considered to be one of the most complex and unbreakable methods of encryption, has been found to be vulnerable to attack, according to a major new study. PublishedRead More →
A security researcher discovered a new variant of the Angler exploit kit that includes the exploit code for a recently patched Adobe Flash Player flaw. The French security researcher “Kafeine”Read More →
Commission faults Oracle’s Java SE update process with making consumers’ computers insecure. Oracle received a public slap on the wrist from the US Federal Trade Commission over Java SE, the desktopRead More →
Banking industry needs more time, has too much on its plate.The Payment Card Industry Security Standards Council (PCI SSC) has announced that it has pushed back the mandatory migration dateRead More →
OS X: NetSpot is a free utility that makes it easy to map out your wireless network, do a site survey if you have a particularly large one to manage,Read More →
Fixed by Microsoft’s latest patches, bug could be “enterprise killer,” says researcher. One of a heaping collection of critical bug fixes pushed out by Microsoft on December 8 as partRead More →
Grub Vulnerability : You can Hack into a Linux PC/laptop just by pressing ‘Backspace’ 28 times Most of us swear by Linux as a super secure operating system but twoRead More →
Today, Rapid7 is disclosing several vulnerabilities affecting several Network Management System (NMS) products. These issues were discovered by Deral Heiland of Rapid7 and independent researcher Matthew Kienow, and reported toRead More →
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security products, which, ironically, are installed to prevent aRead More →
Wave of attacks grows. Researchers advise sites to install just-released patch. Attackers are actively exploiting a critical remote command-execution vulnerability that has plagued the Joomla content management system for almostRead More →