What happens in iLeakage attacks is that the CPU is tricked into executing speculative code that reads sensitive data from memory.
October 29, 2023
A new report from VPN service provider Atlas VPN has revealed startling details about how safe and secure…
October 8, 2022
Protesters in Hong Kong were tricked into visiting a compromised pro-democracy radio station website that delivered DazzleSpy malware…
January 26, 2022
The vulnerability affects top browsers including Chrome, Firefox, Safari, and even Tor browser.
May 17, 2021
This year, Pwn2Own will have an automotive category as well, mainly for hacking Tesla cars. Participants will be offered $600,000 and a vehicle.
April 8, 2021
Pwn2Own 2019 has yet again proved that a secure system is nothing else but a myth. In its…
March 23, 2019
A China-based security researcher associated with the Qihoo 360 Vulcan Team has published a proof-of-concept exploit for a…
January 24, 2019
Apple has been trying hard to improve the security mechanisms of its hardware and software products. The addition…
September 17, 2018
Rafay Baloch has reported Vulnerability in Edge and Safari Browsers that Allows Address Bar Exploitation. Nowadays the phishing…
September 12, 2018