Thursday, December 1, 2022

Most popular ‘Security Is Sexy’ posts of 2012 (year 2012 in review)

2012 was another year of heavy hacking and data dumping, giving headaches to security professionals and intelligence agencies alike. Yet just as important were the spy-and-pry privacy and civil liberties concerns...

iPhones Can Be Hacked in 60 Seconds with Malicious Charger

iPhones can be hacked in one minute with a malicious charger, according to researchers at the Georgia Institute of Technology. The security experts plan to present the proof-of-concept device at the...

One Billion Users can be Affected by Latest Java 5, 6 and 7 Exploit

Oracle’s Java was deemed vulnerable yet again by Polish researcher Adam Gowdiak, except the new breach is universally exploitable in all previous Java SE versions, such as Java 5, 6 and...

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.