Data breaches are the direct result of unauthorized access to protected or sensitive information, ranging from intellectual property and company secrets to...
Tag - compromise
Two new security vulnerabilities affecting free encryption tool TrueCrypt may allow attackers to obtain admin-level privileges and install malware on the...
Puush describes itself as a “quick and simple way to share screenshots”. Unfortunately, it also seems to be a quick and simple way to infect your...
Java applets may fully compromise Notes users with just one click from cyber-criminals sending them through HTML e-mails, according to an IBM security advisory...
A Skype user by the handle Ximer had his account stolen six times in a single day by a group of cyber-crooks. According to a post by the victim on the Skype...
Several vulnerabilities in the DIR-600 and DIR-300 routers of network solutions company D-Link may allow hackers to redirect Internet traffic and compromise...
Don