4G and 5G Vulnerabilities Allow Call Interception and Location Tracking
Researchers Discover Vulnerabilities in 4G and 5G Networks A joint team of researchers from Purdue University and Iowa State University has identified […]
Researchers Discover Vulnerabilities in 4G and 5G Networks A joint team of researchers from Purdue University and Iowa State University has identified […]
Tor Project Releases OnionShare 2: A Secure File Sharing Application The Tor Project has announced the release of OnionShare 2, a utility […]
Internet Freedom Index: January’s Expected Decline According to research by the Internet Protection Society (OZI), Russia’s Internet Freedom Index dropped by 25 […]
SearchFace Developer on the Capabilities of the Algorithm Due to the buzz around the lawsuit with VK, the main reason we launched […]
Firefox 65.0.1 and Tor Browser 8.0.6 Updates A corrective release, Firefox 65.0.1, has been prepared, addressing three vulnerabilities and fixing eight bugs. […]
14 Essential Gadgets for Hackers and Security Researchers Unusual devices and gadgets aren’t just for secret agents and special forces. Many devices […]
Hacker Sentenced to 10 Years for $5 Million SIM Swap Fraud In Santa Clara County, California, a landmark sentence has been handed […]
Two Hacker Groups Account for 60% of Major Cryptocurrency Exchange Breaches According to the analytics firm Chainalysis, just two hacker groups are […]
Cranes and Heavy Machinery Vulnerable to Cyberattacks Security researchers from Trend Micro have analyzed the communication mechanisms in cranes and other industrial […]
Why Are Smart TVs So Affordable? Smart TV manufacturers are finding new ways to profit from their products long after the initial […]