Tornado alert systems in Texas were hacked
On March 12th, around 2:00 A.M., the sound of emergency alerts awakened the inhabitants of two locations in Texas, U.S., all due to a hacking incident, reported ethical hacking trainingRead More →
On March 12th, around 2:00 A.M., the sound of emergency alerts awakened the inhabitants of two locations in Texas, U.S., all due to a hacking incident, reported ethical hacking trainingRead More →
Tesla Motors has filed a lawsuit against a former employee who allegedly would have stolen the source code of Autopilot, Tesla’s semi-autonomous driving system, to give it to the ChineseRead More →
Experts of an online ethical hacking training from the International Institute of Cyber Security reported the emergence of vulnerability in Google Photos with which a malicious actor could access theRead More →
PuTTY, the SSH client has been updated with various security patches, while its main maintainers recently admitted that a critical vulnerability was corrected, reported online ethical hacking training experts fromRead More →
Apparently it is impossible for Facebook to get away from the problems. According to an ethical hacking training expert from the International Institute of Cyber Security, the social network facesRead More →
In recent days Intel released a considerable amount of update patches to correct various vulnerabilities that could allow remote code execution in compromised systems, reports an ethical hacking training expertRead More →
An ethical hacker from the International Institute of Cyber Security reports the discovery of critical security vulnerability in TCPDF, one of the most used PHP libraries to generate PDF files.Read More →
According to an ethical hacker from the International Institute of Cyber Security, a hacker, known as “Gnosticplayers”, offers to disclose personal details of 26 million users from six companies aroundRead More →
Reports of an ethical hacker from the International Institute of Cyber Security mention that Norsk Hydro, one of the world’s leading aluminum-producing companies, has become the victim of a seriousRead More →
According to cybersecurity specialists, in collaboration with an ethical hacker from the International Institute of Cyber Security, malicious hackers are showing special interest in abusing legitimate protocols to increase frequencyRead More →