Ops, a 17-Year-Old flaw in MS Office, tracked as CVE-2017-11882, could be exploited by remote attackers to install a malware without user...
A few days ago, the company Armis published a proof of concept (PoC) of a remote code execution vulnerability in Android via Bluetooth (CVE-2017-0781),...
Android apps with millions of Google Play downloads also crash the party. A researcher has documented almost 2,500 sites that are actively...
New AVGater flaw provided key ingredient for hacker to hijack computer. Antivirus programs, in many cases, make us safer on the Internet....
Researchers and private industry experts, along with DHS officials, remotely hacked a Boeing 757 airplane that was parked at the airport in...
A new Antivirus design flaw has discovered and named as AVGater for the Windows Local Privilege Escalation Vulnerability which is presented in...
The security experts Florian Bogner devised a method dubbed AVGater to escalate privileges by abusing the quarantine feature of some antiviruses. Several popular antivirus...
AS DANGEROUS AS they may be, the Kremlin-linked hacking group known as APT28, or Fancy Bear, gets points for topicality. Last year, the...
Intel’s management engine – in most Positive Technologies plans to demonstrate at the next Black Hat conference how to hack over USB...
In Part 1 of this series, we’ll be exploiting a stack buffer overflow using a Saved Return Pointer Overwrite attack. Hopefully, you’re all...
A Google-developed kernel fuzzer has helped locate dozens of Linux security flaws. Google researcher Andrey Konovalov has revealed 14 flaws in Linux...
Multiple vulnerabilities found in Linux USB drivers that included with Linux kernel USB subsystem. It can be triggered by an attacker who...
Networked consumer and business printers manufactured and sold by Brother contain an unpatched vulnerability that can be abused by a remote attacker...
Experts discovered flaws in IEEE P1735 electronics standard, which describes methods for encrypting electronic-design intellectual property (IP). Crypto flaws in the IEEE P1735 electronics standard expose highly-valuable...
Cisco said that changes to its implementation of the Border Gateway Protocol (BGP) over an Ethernet VPN has created a vulnerability in...
TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected. Mac and Linux versions of the Tor anonymity...
The annual mobile Pwn2Own zero-day competition has been renewed for the sixth time. So, we get to see new hacks for devices from...
WordPress developers fixed a serious SQL injection vulnerability on Tuesday with the release of version 4.8.3.. Apply it as soon as possible. WordPress...
Bitcoin mining websites became the new fashion of 2017 and there is no dust on that but when it comes to compromise...
The makers of the popular parental control system called Circle with Disney patched 23 vulnerabilities over the weekend. The bugs ran the...
Oracle Identity Manager (OIM) allows companies to manage the entire user life-cycle overall company resources both within and behind a firewall. Within...