Most popular ‘Security Is Sexy’ posts of 2012 (year 2012 in review)

0
2012 was another year of heavy hacking and data dumping, giving headaches to security professionals and intelligence agencies alike. Yet just as important were the spy-and-pry privacy and civil liberties concerns...

iPhones Can Be Hacked in 60 Seconds with Malicious Charger

0
iPhones can be hacked in one minute with a malicious charger, according to researchers at the Georgia Institute of Technology. The security experts plan to present the proof-of-concept device at the...

New Java zero-day exploit being used by hackers in these days

0
Back in August last year we were recommending you disable or uninstall Java unless you really needed to keep it. The reason was a zero-day exploit that Oracle had known about...

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close