WordPress is one of the most used content management system (CMS) in the world. So when there is a security flaw in...
WordPress 4.7.1 and earlier forms are influenced by various vulnerabilities. A remote attacker could exploit some of these vulnerabilities to take control...
Pattern lock on Android smartphones might be the quickest and simplest way to gain get entry to to the device. a collection of...
Researchers from UK and Belgium have jointly conducted a research and concluded that hacking into implantable medical devices or IMDs is as...
Hi there my fellow hackers, we are back with another tutorial. Today we will see how we can use a Nmap script...
Firefox is vulnerable to a Malicious Add On Attacks. A critical vulnerability which is in the fully patched version of the Mozilla’s...
Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets....
The developers of Acunetix vulnerability scanner tool had their website defaced by a hacker who claims he did it for Lulz! An...
Short Bytes: A security firm Trend Micro has announced a call to action on the situation that Apple is deprecating QuickTime for...
You maybe a top notch developer or programmer but do you know which program languages generate most software security bugs? Recently, a lot...
Earlier this year we reported about security measures taken by United Airlines that they’ll give you up to a million miles to...
Microsoft Windows, in spite of having an insignificant share in the mobile market, is the leading operating system that is responsible for...
Potential Security Flaw In Obsolete CMS and Plugins Left Millions of Users Vulnerable To Ransomware. More than 142 million websites have been...
The Zero-day vulnerability presented by IBM’s researchers Or Peles and Roee Hay will affect all Android devices. The two researchers from IBM’s...
Aran Khanna, a Harvard student, was deprived of a chance to intern at Facebook after he exposed a critical privacy related flaw...
A security flaw in the Facebook API allows hackers to decrypt and scan IDs, which left 1.44 billion Facebook users identities at...
Are you an Android phone user? Please pay attention as now it only takes one text message to hack an Android phone....
An electronic Mattel toy was transformed into a tool by Samy Kamkar to unlock all kinds of fixed-code garage doors within seconds....
The CrowStrike researchers discovered that any attacker can burst out of specific virtual machines and exploit whatever is running nearby — The...
Researchers have identified a relatively “common” cross-site scripting flaw (XSS) in some famous WordPress plugins — A coordinated plugin update has been released to...
Researchers have identified a vulnerability in some Adobe Flash Player versions that can be exploited by attackers for spying on users having...