How Shellshock can be exploited over DHCP
Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and discus…
Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and discus…
A watering-hole attack has been discovered to be orchestrated by a cyber-espionage group that targets individuals connected to the military sector; victims are redirected from the…
Payment services provider PayPal is vulnerable to an authentication restriction bypass vulnerability, which could allow an attacker to bypass a filter or restriction of the online…
A team of German researchers developed an innovative Android app dubbed DREBIN capable of detecting 94 percent of mobile malware.
A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs.