Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets....
There’s a fundamental difference between criminal hackers and white hat vulnerability researchers. When a white hat finds a vulnerability they may explore...
In April, an independent researcher launched a tool called OnionScan, which probes dark web sites for various vulnerabilities and other issues. Now,...
Developers with the open source content management framework Drupal today patched a series of highly critical remote code execution bugs in three...
Blind SQL injection vectors are considered either partial-blind or full-blind in terms of feedback provided to the attacker. Often SQL injection vulnerabilities...
Before discovering my latest Magento RCE, I’ve found two different vulnerabilities, both resulting in the complete compromise of customer data and/or the...
Foxit patched a dozen vulnerabilities in its PDF reader software this week, more than half of which could allow an attacker to...
Users are now prompted to update to the latest version. Apple is now blocking older versions of Adobe’s Flash Player because of security...
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your...
Cyber security affects all of us, but it only makes the headlines when it’s big companies that are the target of attacks....
One can allow a crook to wipe devices clean. Two researchers from Check Point’s mobile security division have uncovered two vulnerabilities in LG’s...
Short Bytes: SourceClear’s Open is a new tool to find potential threats in the open source code. This tool works for different...
Exploits exist for both bugs and allow for remote code execution. Windows users woke up to something that doesn’t happen every day: the...
Security firm urges Windows users to uninstall media player. If your Windows computer is running Apple’s QuickTime media player, now would be a...
The Open Sourced Vulnerability Database (OSVDB) shut down permanently in response to the lack of assistance from the industry. The Open Sourced Vulnerability...
Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known...
David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.
Popular open source shopping cart app Zen Cart is warning its users of dozens of cross-site scripting vulnerabilities found in its software....
NMAP is an essential tool in any hacker’s arsenal. Originally written by Gordon Lyon aka Fydor, it’s used to locate hosts and...
Short Bytes: As a part the latest Patch Tuesday, Microsoft released 13 security patches for all version of Windows and other software like...
Voice Recognition Technology is a big thing these days but did you know the threats it carries within itself? “Hey, Siri! Who...