- Security
- By Eduard Kovacs
- August 7th, 2013
Django: BREACH Attack Against HTTPS Can Be Used to Compromise CSRF Protection
The BREACH attack allows cybercriminals to intercept information from HTTPS traffic
- Security Fixes and Improvements
- By Eduard Kovacs
- August 5th, 2013
Samsung Smart TVs Can Be Hijacked, Researchers Warn
Hackers can use the device's webcam to spy on the owner
- Security Blog
- By Eduard Kovacs
- August 3rd, 2013
Black Hat USA 2013 Keynote by General Keith Alexander – Video
The NSA chief was booed and accused of lying to Congress
- Hacking News
- By Eduard Kovacs
- August 3rd, 2013
Expert Uses Decoy Water Plant to Show Chinese Hackers Are Targeting ICS
Trend Micro's Kyle Wilhoit presented his findings at Black Hat 2013
- Security Fixes and Improvements
- By Eduard Kovacs
- August 2nd, 2013
Flaws in UEFI Implementation Can Be Abused to Bypass Windows 8 Secure Boot
Researchers have presented two attack methods at Black Hat 2013
- Security Fixes and Improvements
- By Eduard Kovacs
- August 2nd, 2013
JavaScript Attacks Can Be Used to Steal Web Browser Data, Experts Warn
Security researcher Paul Stone presented his techniques at Black Hat 2013