Cyber security news for all

More

    Vulnerabilities

    A new text bomb is currently affecting the iPhone and iPad

    Remote attackers can temporarily paralyze iPhones and iPads by transmitting certain characters. If the string is received as a message, the device usually freezes...

    Attackers use iPhone vulnerabilities in older versions of iOS

    Manipulated websites apparently continue to attempt to inject monitoring tools on iPhones. Attackers use iPhone vulnerabilities in Apple's browser engine, which make certain iOS...

    Dangerous vulnerabilities have been found in the popular Foxit Reader

    Foxit Reader has released security updates for the Windows editions of its PDF tools. Programs are now available in the latest version. A number...

    Many users report unauthorized logins to their Nintendo accounts

    Owners of Nintendo user accounts are currently reporting more and more unauthorized, mostly multiple successful logins by unknown persons. If hackers gain unauthorized access to...

    Several gaps of Cisco IP phones are considered critical

    Hackers could attack Cisco IP phones as critical security gaps and execute malicious code with root privileges. There are also important security patches for...

    Security leak in Chrome speech recognition component

    What exactly makes the Chrome security leak susceptible to external attacks is still covered in detail by Google. However, it is clear that a...

    Recent Articles