Flash – aaah-aarrgh! Patch now as hackers exploit fresh holes
Flash, I love you, but we only have fourteen hours to save everyone’s computers. Adobe has urged users to patch their Windows, OS X and Linux editions of Flash Player toRead More →
Flash, I love you, but we only have fourteen hours to save everyone’s computers. Adobe has urged users to patch their Windows, OS X and Linux editions of Flash Player toRead More →
The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The Russian security tester Timur Yunusov hasRead More →
A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentageRead More →
Hello w0rld! JUMPSEC researchers have spent some time on the glibc DNS vulnerability indexed as CVE 2015-7547 (It hasn’t got a cool name like GHOST unfortunately…). It appears to beRead More →
A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen. A number of bypass vulnerabilities still affect iOS devicesRead More →
Federal Reserve officials deny the incident took place. Serious accusations have been made today by Bangladesh’s central bank, which has said that hackers breached its US Federal Reserve account and stoleRead More →
A security researcher has discovered a Facebook password reset vulnerability that allowed him to brute force into any FB account. The security researcher Anand Prakash has discovered a password reset vulnerability affecting Facebook. TheRead More →
Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to spy on and even control a device. ItRead More →
This post was written by Marek Vavruša and Jaime Cochran, who found out they were both independently working on the same glibc vulnerability attack vectors at 3am last Tuesday. ARead More →
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep confidential information or you are a provider ofRead More →