Hacking

VMWare addressed severe Code Execution vulnerabilities in several products

VMware has released security updates to address four vulnerabilities in its ESXi, vCenter Server Appliance (vCSA), Workstation and Fusion products.…

8 years ago

Windows 10 Hello facial recognition feature can be spoofed with photos

Experts discovered that the Windows 10 facial recognition security feature Hello can be spoofed using a photo of an authorized user. Security experts at pen-test…

8 years ago

Backdoor in Captcha Plugin poses serious risks to 300K WordPress sites

Experts discovered that the popular WordPress Captcha plugin installed on over 300,000 sites was recently updated to deliver a hidden backdoor.…

8 years ago

U.S. blames North Korea for the massive WannaCry ransomware attack

It's official, according to Tom Bossert, homeland security adviser, the US Government attributes the massive ransomware attack Wannacry to North…

8 years ago

The thin line between BlackEnergy, DragonFly and TeamSpy attacks

Experts from McAfee Labs collected evidence that links DragonFly malware to other hacking campaigns, like BlackEnergy and TeamSpy attacks. On…

8 years ago

Networked Printers are Some of the Oldest IoT Devices, and over 1,000 Lexmark Printers Are Vulnerable Today

Experts at NewSky Security scanned the Internet and discovered that "out of 1,475 unique IPs, 1,123 Lexmark printers had no…

8 years ago

Expert found critical issues in Palo Alto PAN-OS Networks Security Platform

Palo Alto Networks released security updates for its PAN-OS security platform that address critical and high severity vulnerabilities Last week, Palo…

8 years ago

Researchers discovered two serious code execution flaws in vBulletin not yet unpatched

Two code execution vulnerabilities affecting version 5 of the vBulletin forum software were disclosed by researchers last week. Two code…

8 years ago

BGP hijacking – Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia

Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia, experts believe it was an intentional BGP Hijacking.…

8 years ago

Zealot Campaign leverages NSA exploits to deliver Monero miners of both Windows and Linux servers

Security researchers spotted a sophisticated malware campaign, tracked as Zealot campaign targeting Linux and Windows servers to install Monero miners. Security researchers…

8 years ago

This website uses cookies.