Windows Task Scheduler was Microsoft’s answer to Unix Cron, for the purpose of running applications, scripts, and batch commands on-schedule. It was...
WiFi Broadcasts in Android OS Leaking sensitive data from a user’s Android device and the details about all the application that running...
Researchers have uncovered an “API-breaking” vulnerability, which could expose Android device systems data to rogue apps. The sensitive information thus exposed could...
New Privilege Escalation Bug Identified in Windows OS. Recently a Twitter user, using the handle SandboxEscaper, disclosed that the Microsoft Windows OS...
Ghostscript, a mainstream raster image processor and back-end raster image converter for PDF has been discovered of harboring a critical vulnerability, a...
Windows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from...
Trend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”. It is designed...
A new zero-day exploit for Windows VBScript Engine discovered that belongs to North Korean cyber criminals gang called Darkhotel which is the same...
A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system...
Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your...
Penetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The...
Turns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible...
Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the victim’s windows computers. FELIXROOT backdoor campaign initially...
The United States, through its intelligence agencies, has uncovered a major cyber espionage vulnerability against software-based supply chain software. A supply chain...
Antimalware companies have made many innovations for many decades in order to keep individuals and enterprises secure from cyber risks. However, human...
Security specialists on Tuesday revealed a technique that could’ve enabled hackers to bypass a wide range of extensive commercial products to protect...
A serious vulnerability, which could cause remote code execution attacks has been detected and then patched in the Git software source code....
A vulnerability in the Steam client was an open door to hackers for more than 10 years. The vulnerability was discovered by...
Popular dialer app Drupe is now back on the Google Play Store, following security vulnerability, for anyone who’d want to download it....
Quite recently, a simple but serious application-level DoS (Denial of Service) flaw has been discovered in the WordPress CMS platform; this DoS...
Online bank accounts are among the most favorite of targets for all hackers, as per a recent survey report. A report published...