Zephyrnet Logo

Tag: Exploit

Samsung Pay flaw that could be exploited by hackers

Reading Time: 3 minutesSamsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly...

Lack of Basic HTTPS Leads to Major Data Breach at Clash of Kings Forum

Reading Time: 2 minutesClash of Kings is a very popular mobile game with millions of avid players being members of its official forum....

Deep Reinforcement Learning

We have subsequently improved the DQN algorithm in many ways: further stabilising the learning dynamics; prioritising the replayed experiences; normalising, aggregating and re-scaling the...

Stabilizing quantum bits

Quantum computers are largely hypothetical devices that could perform some calculations much more rapidly than conventional computers can. They exploit...

Majorana Zero Modes in Graphene

Each matter particle in nature has been known, since the time of Paul Dirac, to have an associated antiparticle, with the exception of...

FROM THE COMODO ANTIVIRUS LABS: File infectors vs. Comodo Auto-Containment

Reading Time: 2 minutesThe security engineers and IT experts from the Comodo Antivirus Labs are constantly analyzing the thousands of malware families that...

$46million Stolen in Cyberheist – don’t let this be your company

Reading Time: 2 minutesIt has been reported that networking firm Ubiquiti Networks was the victim of cyber theft, where more than $46million was...

Beware Ad Attacks: Malvertising is Booming

Reading Time: 2 minutesRemember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not...

Mozilla Releases Critical Security Updates for FireFox, Thunderbird

Reading Time: 1 minuteSecurity updates released this week by Mozilla include security fixes for numerous vulnerabilities in Firefox, Firefox ESR, and Thunderbird. These...

10 Steps to Avoid Identity Theft

Reading Time: 2 minutesIdentity theft is the fastest growing crime and is costing Americans millions of dollars, not to mention the many hours...

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

OpenSSL Security Update Patches Denial of Service Vulnerability

Reading Time: 1 minuteOpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service...

Latest Intelligence

spot_img
spot_img