Discover how sound waves can be used to perform Denial of Service (DoS) attacks on hard disks, potentially causing data loss or hardware damage. Learn about the
Explore the Tethr vulnerability that bypasses the tethering service provisioning check in pre-7.1.2 Android versions. Learn about the technical details and how
Learn about the Catelites Bot, a new Android malware that mimics over 2200 financial institutions' apps. Understand how it uses social engineering techniques to