Tag : Vulnerability

Latest Posts

iPhone

0 SHARES

iOS Lock Screen Bypass Vulnerability Fixed By Apple

Apple has reportedly fixed a security flaw in the iOS operating system that would allow attackers to be able to bypass passcode lock screens on iPhone 6S and 6S Plus that are running version 9.3.1 of…

0 SHARES

39 Android Flaws Fixed in Major Security Patch

Google’s latest patch for their Android operating system is one of the biggest security patches ever released for the OS. This monthly security update covers 39 vulnerabilities that had been found, of which 15 were of…

iPhone

0 SHARES

iOS Mobile Device Management Protocol Can be Abused to Load Malware

  Apple has worked hard to make it difficult to allow users to unwittingly install unauthorized and malicious apps onto their devices. Despite this, there is still one way in that attackers are still able to…

0 SHARES

Stagefright Vulnerability Now a Serious Threat to Android Devices

  The Stagefright vulnerability in Android is nothing new, however for a long time it was (mostly) harmless due to difficulties in reliably using the flaw for malicious purposes Unfortunately for Google and Android users, researchers…

0 SHARES

Bounty for Chromebook Hack Doubled to $100,000

Many companies seek to outsource the finding of vulnerabilities in their products to external hackers, offering monetary rewards in exchange for details on successful hacks that they can fix. In a show that should both display…

0 SHARES

Two Year Old Java Vulnerability Reappeared Thanks to Broken Patch

Back in 2013, Oracle released a patch for a critical security flaw in Java. Now it has been found that this patch was ineffectual and easily bypassed, once again making PCs and servers running even the latest…

0 SHARES

Adobe Issues Patch For Code-Execution Bug

Flash has long been at the heart of a debate over usability and security. The media player has long been used for everything from Youtube to online games, but it has often by problems with even…

0 SHARES

Researcher Finds New Way to Hijack Drones Mid-Flight

It is often easy to forget that while the majority of drones making the news are operated by hobbyists and amateurs, the US government is rolling out a number of more expensive UAVs for use by…

0 SHARES

One in Three Servers Affected by New TLS Decryption Hack

A new vulnerability has been discovered by security researchers that could be used to allow eavesdroppers to spy on the traffic between users and as many as one-in-three HTTPS servers. The problem arises due to the fact…

0 SHARES

Video Surveillance DVRs Exposed by Hard Coded Password

The security of devices that are internet accessible has become more and more critical in recent years. Recently cheap unsecured webcams have come under fire after many such devices were exposed by the Shodan search engine. Now…

0 SHARES

eBay Vulnerability Exposes Users to Data Theft and Phishing Attacks

The eBay site is used by millions of people and as a result, has a level of trust with its users buying and selling countless items each day. Imagine then, how lucrative a target this massive…

0 SHARES

OpenSSL Bug Allowed Attackers to Decrypt HTTPS Traffic

The OpenSSL cryptographic library was recently updated in response to a high severity vulnerability that was found its code. The vulnerability made it possible for attackers to get hold of the decryption key used for traffic…

0 SHARES

Microsoft Edge Browser is Storing Private Browsing Data

With the jump to Windows 10, Microsoft also hoped to say goodbye to their old Internet Explorer browser, one often berated by the tech savvy. In Edge, they included many features that were already staples among…

0 SHARES

Shodan Makes Snooping on Vulnerable Webcams Easy

Shodan is a search engine designed to allow users to search through information on devices that are connected to the internet. The site, named after the AI from the System Shock series of games has been around…

0 SHARES

D-Link Wi-Fi Webcam Turned into a Network Backdoor

Vectra Networks researchers today released an article demonstrating how they turned a $30 D-Link Wi-Fi webcam into a backdoor onto its owner’s network. Installing a device like a networked webcam may seem like a riskless action,…

0 SHARES

ARRIS Cable Modems Have “Backdoor in the Backdoor”

Up to 600,000 ARRIS cable modems could be vulnerable to hacks via a “backdoor in the backdoor”, according to security researcher Bernardo Rodrigues. Rodrigues, who works as a vulnerability tester for the Globo TV network in Brazil,…

0 SHARES

Fully Patched Adobe Flash Hit by New Zero-Day Update

Just as day follows night, and just as UbiSoft thinks up new and amazing game elements to strip away and charge microtransactions for, another zero-day exploit has been discovered for Adobe Flash. But this isn’t any…

0 SHARES

Exploit Found In Netgear Routers

So we’ve all had those periods where we come home and think our stuff has been moved around, you know when you think you’ve put your keys down beside the door and you find them on…

0 SHARES

Wifatch: The Vigilante Malware

Malware. That one word which seems to inspire fear and dread in everybody who hears it, even more so when you’ve experienced it first hand on one of your many devices. Malicious Software, or Malware for…

0 SHARES

WinRAR at Risk of Huge New Zero Day Vulnerability

WinRAR has a base of some 500 million users worldwide, those same users might want to take a look at a new Zero Day Vulnerability which has been detected within the newest version of the software. According…

0 SHARES

Android Lollipop Lock Screen Can be Bypassed Using Really Long Password

Any Android Lollipop device that is not using the latest build of the mobile operating system is vulnerable to having its lock screen bypassed by inputting a long string of characters as password. The bypass was…

0 SHARES

Chrome to Block Flash Ads from 1st September

Google has confirmed that from 1st September onwards, its Chrome internet browser will “begin pausing many Flash ads by default”. Though the announcement, made through the AdWord Google+ page, claims that the measure is being taken…

0 SHARES

New Android Vulnerability Affects Everything on the Device

Following Stagefright, another worrying Android vulnerability has been uncovered by researchers. The security flaw can be exploited by taking advantage of the operating system’s multitasking functionality, giving hackers access to every part of the device. “The…

0 SHARES

Intel Processors Vulnerable to Rootkit Exploit Since 1997

A researcher from the Battelle Memorial Institute has revealed that every Intel x86-based processor – and possibly some AMD processors – since 1997 are vulnerable to a rootkit exploit that could grant hackers access to the…

0 SHARES

Hackers Find Serious 0day Vulnerability in Mozilla Firefox

Mozilla got word this Wednesday that a severe Firefox 0day vulnerability was being exploited by an ad on a Russian website. Although the company was swift in delivering a fix, they are now urging users to…

0 SHARES

New Android Vulnerability That Kills Devices Discovered

Following the discovery of the Stagefright vulnerability, another potentially dangerous Android hack has been found. The bug, uncovered by Trend Micro, can leave an Android device effectively dead, killing the screen and all communication functions, including…

0 SHARES

Four New Bugs Have Been Found in Internet Explorer

I know most of you don’t even use Internet Explorer and we all know how it was humiliated throughout the years. However, since the new Microsoft Edge might be using some IE code, it’s worth pointing…