Scheme Flooding Let Hackers Identifying Users While Browsing Websites Including the Tor

Scheme Flooding Let Hackers Identifying Users While Browsing Websites Including the Tor

A new fingerprint technique has been discovered by the Konstantin Darutkin of FingerprintJS, and Darutkin has claimed that by using this technique...
FragAttacks

FragAttacks – New Security Vulnerabilities Affect Billions of Wi-Fi Devices

Mathy Vanhoef, a cybersecurity researcher from Belgium has recently discovered a bunch of vulnerabilities and named them "FragAttacks." And all these flaws...
Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Aleksander Nikolic, the security expert of Cisco Talos has recently detected a vulnerability that is continuously targeting the "Foxit Reader."
New Spectre Vulnerability Let Hackers Attack Billions of Computers

New Spectre Vulnerability Let Hackers Attack Billions of Computers

The teams of security researchers at the University of Virginia and California (USA) have recently identified a very new Spectre-like attack on...
Hundreds of Millions of Dell Systems Vulnerable to Hack  Due to Driver Bug

Hundreds of Millions of Dell Systems Vulnerable to Hack Due to Driver Bug

The cybersecurity researchers have detected a set of five high-severity flaws in hundred of millions of Dell’s firmware update. The set of...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security