Gaming platforms as vector of cyber attack
The Origin platform allows malicious users to exploit local vulnerabilities or features, by abusing the Origin URI handling mechanism. In other words, an attacker can craft a mali…
The Origin platform allows malicious users to exploit local vulnerabilities or features, by abusing the Origin URI handling mechanism. In other words, an attacker can craft a mali…
Huawei has been accused of poor security practice by Russian researcher Nikita Tarakanov, who told Black Hat Europe last week that the vendor's 3G and 4G devices are vulnerable an…
From today morning greatest czech news servers are under attack, which have knocked out their websites.
Developer Feross Aboukhadijeh has published a simple technique that allows a web page to fill up a hard disk without any action on the user's part. If you'd like to try out the "H…
Virtualization has eased many aspects of IT management but has also complicated the task of cyber security.The nature of virtualization introduces a new threat matrix, and adminis…