Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control...
Bug bounty programs by big tech boys isn’t a new thing to hear. Now, Samsung’s name is also on the list of...
Security experts from FortiGuard Labs discovered a malicious Powerpoint file in name ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx using the CVE-2017-0199 Vulnerability.By...
World’s largest professional network LinkedIn That has more than 500 Million Registered users. LinkedIn messenger Platform Vulnerability Allows attacker spread Malware into victims...
Now comes a case where we see that version control systems are getting affected by malware. It is seen how source code...
Adobe releases patches for critical security flaws which allows attackers to control your system. This bundle applies for Windows, Macintosh, Linux and...
Security researchers at behavioral firewall specialist firm Preempt have discovered two critical security flaws in the Microsoft Windows NT LAN Manager (NTLM)...
A Malware called “EternalBlue” Vulnerability Successfully port the exploit to Microsoft Windows 10 by the Security Researchers which has been only affected...
Vulnerability defined as the weakness that allows attacker to enter in and harm, it may be a flaw in design or misconfiguration....
FreeRADIUS RADIUS Server is the most popular open server and RADIUS resource is widely used worldwide. It supports all standard authentication protocols....
Security specialists from Chaos Computer Clubs found basic strides to break iris recognition system scanner of the new Samsung Galaxy S8. Samsung...
A new Cyber Attack Spreading through Vulnerable Subtitles which Downloaded by Victims Media Player and threatens more than 200 Millions of vulnerable...
A critical SQL Injection Vulnerability( CVE-2017-8917) with Joomla! 3.7, if you are Joomla user it’s you need to update immediately. Joomla! is a...
A bloatware could be a tricky subject to discuss considering that they are pre-installed in most of the IoT devices, but what...
The IT security researchers have discovered that more than 20 different Linksys’ routers models are leaving thousands of devices vulnerable to outside...
Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability...
Short Bytes: A vulnerability has been spotted in Cisco’s Cluster Management Protocol (CMP) which exposes 318 Cisco Switch models to malicious attacks...
The NextGen gallery has been plagued with a severe security flaw for the second time in consecutive years, and this time it...
Closing week, we told about a important zero-day flaw in WordPress that become silently patched by way of the company earlier than hackers...
WordPress vulnerabilities which were discovered recently have been negatively and sometimes fatally affecting countless websites thus far. Initially, there were three flaws...
Remote unauthenticated control over a vulnerable ISP’s gear, could allow an attacker to log into the software as an administrator and remotely...