Wi-Peep: features of wireless peeping
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
653 articles
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
A year after discovery, the Log4Shell vulnerability is still making itself felt.
We investigate the connection between software security and leaks when handling RAM.
The specifics of protecting and updating the OT infrastructure.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
An interesting bug in one of the most popular embedded DBMS.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.