Îstart yesterday;nd with the date of 02.06.2016, the specialists of the department of research and development in the framework of the project NTP (Network Time Protocol) have released version ntp-4.2.8p8 addressing în the main address a series of vulnerabilities identified wi ... Read more ->
ImageMagick is a software package free and open-source software used by web application developers to display, convert and image processing. Recently, there have been discovered multiple vulnerabilities addressed ImageMagick by specialists within the cyber security at HackerOne and Mail.r ... Read more ->
A team of researchers coming from the University of Tel Aviv, Techion and the University of Adelaide has found one way that an attacker could steal the encryption keys used to protect the accounts type wallet (wallet): Bitcoin, Apple Pay, and other sensitive services within the Android and iOS opera ... Read more ->
Drown is a critical vulnerability affecting HTTPS and other services that rely on SSL and TLS, two of the essential cryptographic protocols used for communication security over the Internet. Programmes modern client-server protocol that uses TLS encryption. However, due to configuration errors ... Read more ->