Browsing tag

flaw

Flaws in ISP gateways let attackers remotely tap internet traffic

Defcon is the most important event for the DIY hacking community and this year too, the conference was held in the same spirit. We got to learn about a variety of novel hacking ideas such as the hacking of Voting Machines, hacking airborne drones, hijacking phone numbers and Internet connected car wash system etc. However, […]

Samsung, Nexus, iPhone Devices can be Compromised Due to WiFi Flaws

Gal Beniamini, a Google Project Zero researcher has found some critical vulnerabilities including a remote code execution in Broadcom’s Wi-Fi system-on-chip (SoC) which if exploited can allow attackers to compromise smartphone devices like iPhone, Samsung, and Google Nexus. Broadcom’s Wi-Fi chips are used in a number of renowned devices and any vulnerability makes millions of smartphones vulnerable including Samsung’s […]

Security Flaw Allowed Hackers to Compromise WhatsApp, Telegram Accounts

CheckPoint, an Israeli security firm, unveiled this Wednesday a security flaw in encrypted messages that could affect the web version of WhatsApp and Telegram. The platforms were alerted about the vulnerability on March 8th and have already fixed the issue in both messengers by changing the file upload validation protocols to protect against the attack. The flaw […]

WordPress Plugin NextGEN Gallery Vulnerable to SQL Injection Attack

The NextGen gallery has been plagued with a severe security flaw for the second time in consecutive years, and this time it is even worse. A web security firm- Sucuri discovered that the NextGen gallery for WordPress (WP) is affected by a severe SQL injection vulnerability and attackers can access the targeted website’s database within […]

New Ticketbleed Vulnerability Bleeds Like Old Heartbleed.. Literally

Filippo Valsorda, a researcher from Cloudflare, recently discovered a bug in F5’s BIG-IP Networks. The flaw has been dubbed as Ticketbleed, keeping in mind its similarity with another such bug, Heartbleed. How does Ticketbleed work? Ticketbleed is a vulnerability in the BIG-IP SSL networks that allows for SSL sessions to be leaked which are as large as 31 bytes. This happens due to the […]

WordPress Websites Exposed to Severe Content Injection Vulnerability

WordPress is one of the most used content management system (CMS) in the world. So when there is a security flaw in its system, it affects millions of users on the Internet. That is exactly what has been discovered by security researchers at Sucuri, an Internet security company which revealed that WordPress websites are vulnerable […]

Inherent Vulnerability making Netgear’s Routers Exploitable by Hackers

Security flaws are plaguing devices one-by-one and network routers are the latest to bear the brunt of such flaws as lately, security flaws in routers are being exploited by attackers with extreme enthusiasm. Their aim is to exploit the flaws and launch massive distributed denial-of-service (DDoS) DDoS attacks for bombarding networks with traffic and shutting the […]

AtomBombing; An Injection Code that Infects Multiple Processes in Windows

Security Researchers Discover AtomBombing — An Injection Code that Infects Multiple Processes in Windows leading to malware installation. Ensilo’s security researchers have identified a unique method that allows injection of malicious code into multiple processes without getting identified by any endpoint security system or antivirus software. This method has been labeled as AtomBombing It has […]

“Dirty COW”, the most dangerous Linux Bug for the last 9 years

For the Past 9 Years, Linux Kernel has been Plagued with Dirty Cow – A Privilege-Escalation Bug Red Hat, the leading open source software development firm, has revealed that Linux Kernel has been infected with a serious bug for the past 9 years. The bug has been dubbed as Dirty Cow. It is deemed dangerous […]

OpenJPEG Bug Helping Attackers Conduct Remote Code Execution

Researchers at Cisco Talos have discovered a dangerous zero-day vulnerability in the OpenJPEG JPEG 2000 codec. The flaw can allow attackers to conduct remote code execution on systems. OpenJPEG is a JPEG 2000 codec, which is programmed in C language while the software particularly was developed to popularize JPEG 2000. The JPEG 2000 is an […]

Hacker Shows How to Hack Any Facebook Page; Earns $16k as Bug Bounty

Everyone wants to know how to hack a Facebook page or an account but no one wants to do the hard work — Here’s an Indian hacker who found a critical security flaw in Facebook Business Manager allowing him to hack any Facebook page within 10 seconds. Arun Sureshkumar, an Indian IT security researcher exposed a critical […]

After Linux, TCP Exploit Expandable to 80% of Android Devices

A couple of days ago researchers exposed a Linux flaw allowing hackers to hijack Internet traffic — Now it’s been discovered that the flaw also affects 80% of Android devices! The university of California, Riverside researchers along with the US Army Research Lab has recently announced the presence of a TCP vulnerability in Linux based […]

Critical Security Flaws in Android Devices Affecting Millions of Users

An IT security firm CheckPoint has discovered a set of critical security flaws in several Android devices affecting 900 million users worldwide. Dubbed QuadRooter by the research team, these security flaws can provide an attacker full access to any smartphone that is built using Qualcomm chipsets. Currently, Qualcomm processors are being used in 900 million Android devices. Qualcomm is the world’s […]

Samsung Pay Vulnerability allows Hackers to make Fraudulent Transactions

Hackers show how easy it is for attackers to hack Samsung Pay and make Fraudulent Transactions! The token-based payment system developed by Samsung called Samsung Pay is vulnerable to credit fraud as hackers can use the tokens generated to carry out transactions remotely, ZDNet reports. Samsung Pay is a magnetic-based contactless system that was created in order to […]

Hackers Found Their Way Inside Telegram App

Telegram users are vulnerable to attacks due to programming error allowing anyone to send invisible and over-sized messages on their devices! Telegram is a cloud-based instant messaging service which allows users to send encrypted messages on platforms like (Android, iOS, Windows Phone, Ubuntu Touch) and desktop systems (Windows, OS X, Linux). The service has 100 million […]

Waze Navigation App Vulnerable, Allow Hackers to Spy on Users

You Would be Giving open Invitation to Hackers for Following you by Using Waze. Waze is a well-known and widely used navigation app developed and owned by Google. It is in use by literally million of drivers because it helps in identifying the most appropriate, safe and fastest route to any destination. However, according to the […]