Ooops! This is a 404 page!

Unfortunately, we could not find the page you were looking for. Try going back and changing your search criteria, or explore our latest articles!

Important

Latest Articles

iPhone and iPad, update them immediately to avoid hacker attacks

Anonymous researchers have reported two errors in Apple's operating systems that could be exploited for highly targeted and high-profile sophisticated attacks. The...

New Android 13 security checks, BugDrop malware tries to bypass them

The new security feature introduced for Android 13 tries to protect against malware infections but worries about the result of new research...

Cybercrime and public gaming: this is why security strategies need to be strengthened

Recent analyzes confirm the spread of cyber crimes in digital environments linked to gambling. This is why it is becoming increasingly important to...

Hackers hacked into a space satellite to show movies: anyone can repeat

A group of Shadytel hackers hacked into a commercial satellite to broadcast movies and talks from a cybersecurity conference. It is reported...

Intel SA-00086 vulnerability and CPU firmware security: what impacts in the cyber landscape

Intel SA-00086 vulnerability and CPU firmware security: what impacts in the cyber landscape Discovered in 2017, the Intel SA-00086 vulnerability represents an important...

The Code Dark, to limit hacks to hospitals: what it is and how it works

The Code Dark is a monitoring system implemented by the Children's National Hospital of Washington DC to prevent a cyber attack and...