Microsoft fixed a vulnerability in Microsoft Outlook that could allow remote code execution if the victim opens a specially crafted Office doc. Microsoft recently fixed a number of critical bugs with the last “Patch Tuesday” issued on December 8, including an update to the Microsoft Office suite to fix a number of security issues. One of the […]
An operating system running on firewalls sold by Juniper Networks contains unauthorized code that could be exploited to decrypt traffic sent through virtual private networks. An âunauthorized codeâ was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the âunauthorized codeâ that could allow an attacker to decrypt VPN traffic. [âunauthorized codeâ] âcould allow […]
Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept has leaked online a secret catalog of cellphone spying devices, the precious document has been given to the online publication by someone inside the intelligence community. The person who passed the document to The Intercept […]
Playstation network and Xbox Live risk to be taken down on Christmas by an anonymous group of hackers known as the Phantom Squad. If you remember, last Christmas, both PlayStation network and Xbox Live were took down by hackers belonging to the group of hackers known as Lizard Squad. It looks like this year this […]
The researchers Hector Marco and Ismael Ripoll have found that the Grub2 authentication could be easily defeated by hitting backspace 28 times. A couple of researchers from the University of Valencia’s Cybersecurity research group, Hector Marco and Ismael Ripoll, have found that the Grub2Â bootloader is plagued by a serious vulnerability that can be exploited by […]
The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in which the nodes and edges have statistics such as counts, histograms and sketches.”, its code is available for download on the code-sharing website Github. “Gaffer is […]
The websites based on the popular Joomla CMS need to be updated as soon as possible due to a critical remote code execution vulnerability. The websites based on the popular Joomla CMS need to be updated as soon as possible, Joomla has just released a security patch to fix a critical eight-year-old remote code execution vulnerability. […]
Security experts at the Google Project Zero team have discovered a critical flaw in FireEye appliances that could be exploited via email. A remote code execution vulnerability dubbed â666â affect FireEye Appliances, hackers can exploit the flaw simply by sending an email or tricking users into clicking on a link. The 666 vulnerability resided in […]
Twitter has notified some of its users that they may have been targeted in an attack by state-sponsored hackers. Twitter is warning users of state-sponsored cyber attacks, a small number of users, including a few connected to security and privacy advocacy, have been notified that their accounts were targeted by nation-state hackers. The Twitter users received the notifications […]
The dream comes true for many Sony PlayStation 4 users, a hacker has developed a Jailbreak for the popular armored console. The Sony PlayStation 4 is considered one of the most protected platform, since now it was impossible to run pirated games, but a hacker who calls himself CTurt claimed to develop a fully jailbroken version of […]