The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone messages. A...
The last update for the Uber app raises great concerns because it asks to track users’ location even when they’ve been dropped...
xHamster is a free porn website and does not need details of credit or debit cards. If you are one of those...
Two researchers have found a way to bypass the Apple Activation Lock on both iPhones and iPads, running the two most recent...
Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now. Developers with both Mozilla and Tor have published browser updates that...
Publicly released exploit works reliably against a wide range of Firefox versions. There’s a zero-day exploit in the wild that’s being used...
PayPal fixed an issue that could have allowed an attacker to hijack OAuth tokens associated with any PayPal OAuth application. The vulnerability...
Security experts who conducted an audit on cURL discovered nearly a dozen vulnerabilities that were patched in the last release. The cURL...
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand...
Researchers detect barrage of exploits targeting potentially millions of devices.Online criminals—at least some of them wielding the notorious Mirai malware that transforms...
Bounty hunter Kevin Roh has discovered several security vulnerabilities in the Uber UberCENTRAL Tool that exposed user data. Security expert and bounty...
MSG acknowledges attack aimed at its payment systems. “If you used the credit card to pay for items at Madison Square Garden...
Security researchers from Kaspersky Lab are warning of targeted attacks with InPage zero-day against a number of organizations in Asia. According to experts...
A researcher has released a proof-of-concept exploit for a vulnerability in the Network Time Protocol daemon that could crash a server with...
Adversaries who have compromised one system in a network frequently hijack the network traffic of other systems on the same subnet to...
After crimes in Taiwan and Thailand, the FBI warns of similar potential attacks in U.S. Cybercriminals who once earned millions by breaking...
Hacker Kapustkiy breached into an Italian Government website (Dipartimento della Funzione Pubblica) exposing 9,000 users of 45,000. A few days ago I...
Firmware that actively tries to hide itself allows attackers to install apps as root. Almost three million Android phones, many of them...
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on...
Third-party applications that allow single sign-on via Facebook and Google and support the OAuth 2.0 protocol, are exposed to account hijacking. Three...
The following proof of concept video demonstrates the techniques Cylance researchers used to compromise a Sequoia AVC Edge Mk1 voting machine. The...