A bug in the iOS WebView component allows an attacker to force someone’s iPhone to dial any number, while also locking the...
D-Link DIR model router’s Home Network Administration Protocol (HNAP) service contains a stack-based buffer overflow that has not been patched by the...
Malicious ads exploited zero-day flaw in Android that auto downloaded files. Google has shut down an operation that combined malicious AdSense advertisements...
Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL injection. Belkin’s...
Linux users already got a fix for “Dirty Cow.” Android users aren’t so fortunate. Android users waiting for a fix for a...
Today’s most prolific exploit kit is RIG, which has filled a void left by the departure of Angler, Neutrino and Nuclear. That...
A number of computers at a five-star Geneva hotel that has hosted sensitive talks, including Iranian nuclear negotiations, were found to be...
Cisco has emailed users of its mobile careers site, warning of two occasions when their data could have been exposed. Users of...
Your phone can talk to advertisers beyond your back, beyond your audible spectrum. Dystopian corporate surveillance threats today come at us from all...
Communications failure leads to zero day, late patch, natch. Millions of do-it-yourself websites built with the Wix web maker were at risk...
The Linux Plumbers Conference’s internet has been slowed to a crawl. SANTA FE, NM — If you can’t reach your favorite Linux...
Our efforts to make the internet safer and protect our customers involves, amongst many other things, researching and identifying zero-day vulnerabilities in...
The information about a 0-day SAP vulnerability was published on LinkedIn on October 28, 2016. A researcher disclosed details of the vulnerability...
A Windows zero-day vulnerability is being used in an unknown number of attacks, Google disclosed today, 10 days after it privately reported...
Patch to drop 1400 UTC, Tuesday. And the haste of its release suggests this is scary. The world’s second-favourite content management system,...
Apple has distributed a fresh round of security updates to address remote-code execution holes in iOS, macOS, Safari, and the firmware for...
This post takes a quick look at Sphinx’s domain generation algorithm (DGA). Sphinx,another Zeus-based banking trojan variant, has been around circa August...
Permission-less apps take only seconds to root phones from LG, Samsung and Motorola. Researchers have devised an attack that gains unfettered “root” access...
Researchers at InTheCyber firm have discovered a new easy exploitable and dangerous vulnerability affecting messaging systems. InTheCyber – Intelligence & Defense Advisors...
Adult website Adult FriendFinder may have been compromised by a hacker who said he has gained access to the site’s backend servers and posted...
Information Security experts have discovered an SQL injection zero-day vulnerability in Joomla component ja-k2-filter-and-search. Information Security Researchers Dimitrios Roussis and Evangelos Apostoloudis...