The more connected we are with our tablets, mobiles, desktops, laptops, the more we are susceptible to an attack. The connected world boasts of different
Month: October 2017
If you thought, remotely seizing a machine and making it obey your orders was what sci-fi movies were made of, think again! The Shellshock vulnerability