Learn about the loophole that allows unlimited free internet usage by tricking billing systems. Explore how operators' policies and their impact on security are
Discover critical flaws in popular JSON web token libraries and learn how to update or switch to secure alternatives. This article discusses the 'none' algorith
Explore advanced techniques to bypass Control Flow Guard on Windows 8.1 for exploiting CVE-2015-0311 in Adobe Flash Player. Understand how to overcome security
Italian security expert Vincenzo C. Aka discovered a critical Uber authentication flaw that allows attackers to reset any account password with just an email ad
Discover critical security flaws in Huawei WiMAX routers including unauthenticated data leakage and session hijacking. Learn about affected devices and potentia