Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims

February 7, , 1:00 pm

Apple Downplays Impact of iBoot Source Code Leak

February 8, 2018 , 5:26 pm

Google Expands Play Marketplace Bug Bounty Program

February 7, 2018 , 5:22 pm

Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS Server

February 8, 2018 , 2:51 pm

Grammarly Patches Chrome Extension Bug That Exposed Users’ Docs

February 5, 2018 , 4:20 pm

Covert Data Channel in TLS Dodges Network Perimeter Protection

February 5, 2018 , 2:26 pm

New Monero Crypto Mining Botnet Leverages Android Debugging Tool

February 5, 2018 , 2:15 pm



Source link

thanks you RSS link
( https://threatpost.com/-destroyer--behind----researchers-say/129918/)

LEAVE A REPLY

Please enter your comment!
Please enter your name here