Hacking

A bug in the Android MediaProjection service lets hackers to record audio and screen activity on 77% of all devices

A flaw in the Android MediaProjection service could be exploited by an attacker to record audio and screen activity on around…

8 years ago

According to UIDAI, more than 200 government websites made Aadhaar system users’ details public

According to the Unique Identification Authority of India (UIDAI), details for Aadhaar system were displayed on 210 government websites. The state government websites…

8 years ago

De-authentication attack on Amazon Key could let crooks to disable your camera

Researchers with Rhino Security Labs demonstrated how to disable the camera on Amazon Key, which could let a rogue courier…

8 years ago

City of Spring Hill in Tennessee still hasn’t recovered from ransomware attack

In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but it still hasn't recovered from attack…

8 years ago

Who is behind MuddyWater in the Middle East? Likely a politically-motivated actor

Researchers are investigating a mysterious wave of attacks in the Middle East that was dubbed MuddyWater due to the confusion…

8 years ago

Oracle issues emergency patches for JOLTANDBLEED flaws

JoltandBleed - Oracle issued an emergency patch for vulnerabilities affecting several of its products that rely on the proprietary Jolt protocol. Oracle…

8 years ago

Kaspersky provided further details on NSA Incident. Other APTs targeted the same PC

Kaspersky Lab publishes a full technical report related to hack of its antivirus software to steal NSA hacking code. In…

8 years ago

20 Million Google Home and Amazon Echo devices are affected by the Blueborne flaws

Millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo, are affected by the Blueborne flaws. A series of recently disclosed critical…

8 years ago

Formidable Forms plugin vulnerabilities expose WordPress sites attacks

A researcher from Finland-based company Klikki Oy has discovered several vulnerabilities in the Formidable Forms plugin that expose websites to attacks. The…

8 years ago

17-Year-Old MS Office flaw CVE-2017-11882 could be exploited to remotely install malware without victim interaction

Ops, a 17-Year-Old flaw in MS Office, tracked as CVE-2017-11882, could be exploited by remote attackers to install a malware…

8 years ago

This website uses cookies.