Discover how hackers can exploit a Microsoft Word vulnerability to install malware through automated link updates. Learn about the high-risk CVE 2017-0199 and i
Discover the severe security threat in modern smart cars due to a vulnerability in the CAN protocol. Learn how hackers can disable essential safety features lik
Explore the latest advancements in children's smart devices by 360, featuring cutting-edge AI technologies like voice recognition and precise location services.
Three Chinese hackers were fined $8.8 million by the US Securities and Exchange Commission (SEC) for stealing sensitive merger plans from two New York law firms
This article discusses the resurgence of ransomware targeting IoT systems, highlighting the increasing threat to national and infrastructure security. It explor
The newly issued Public Internet Cybersecurity Emergency Plan aims to enhance national cybersecurity. Learn about the new trends in cybersecurity and how major
Discover the details of ATMii, a new malware targeting specific Windows-based ATMs. Learn about its operations, commands and how banks can protect against simil
Discover the details of the Bad Rabbit ransomware that has affected Russia and Eastern Europe, demanding a payment of 0.5 bitcoins for decryption. Learn about i
The UK's information commissioner warns government agencies to focus on teenage 'bedroom hackers' rather than foreign state-backed attacks. This article discuss