Hacker found a way to hack Facebook by exploiting the ImageMagick flaw
I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many processingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many processingRead More →
Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel. NamedRead More →
A security expert discovered a flaw in the Facebook Messenger audio clip recording feature that could be exploited to listen to audio chats. Voice recording is one of the mostRead More →
Alarmed by allegations of Russian meddling in the 2016 US presidential race, French authorities have warned political parties against the threat of cyber attacks as the country prepares to electRead More →
Exclusive: Privacy campaigners criticise WhatsApp vulnerability as a ‘huge threat to freedom of speech’ and warn it could be exploited by government agencies A security backdoor that can be usedRead More →
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA – Direct Memory Access. Once code execution is gained in UEFI/EFI Runtime ServicesRead More →
Researchers claim that the malware is currently priced at $4,000 and comes with ‘bot killer’ features. Security researchers have uncovered a new malware strain, dubbed Nuke, put up for saleRead More →
Cracking The 12+ Character Password Barrier, Literally 12 Characters? Are you serious?! What do I mean by cracking 12 characters passwords and above? I’m simply stating that with modern hardware,Read More →
The number of hijacked MongoDB servers held for ransom has skyrocketed in the past two days from 10,500 to over 28,200, thanks in large part to the involvement of aRead More →
Bootmode exploit gave attackers ability to hack modem, eavesdrop on calls. Google has shut down a “high-severity” exploit in its Nexus 6 and 6P phones which gave attackers with USBRead More →