Security News
Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in Windows user without...
Open MongoDB databases are being targeted by criminals who are deleting the contents and asking for a ransom.
A new Android Trojan, Switcher, uses victims' devices to infect WiFi routers and funnel users of the network to malicious sites.
Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be exploited by simply...
Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.