A flaw in the Android MediaProjection service could be exploited by an attacker to record audio and screen activity on around…
According to the Unique Identification Authority of India (UIDAI), details for Aadhaar system were displayed on 210 government websites. The state government websites…
Researchers with Rhino Security Labs demonstrated how to disable the camera on Amazon Key, which could let a rogue courier…
In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but it still hasn't recovered from attack…
Researchers are investigating a mysterious wave of attacks in the Middle East that was dubbed MuddyWater due to the confusion…
JoltandBleed - Oracle issued an emergency patch for vulnerabilities affecting several of its products that rely on the proprietary Jolt protocol. Oracle…
Kaspersky Lab publishes a full technical report related to hack of its antivirus software to steal NSA hacking code. In…
Millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo, are affected by the Blueborne flaws. A series of recently disclosed critical…
A researcher from Finland-based company Klikki Oy has discovered several vulnerabilities in the Formidable Forms plugin that expose websites to attacks. The…
Ops, a 17-Year-Old flaw in MS Office, tracked as CVE-2017-11882, could be exploited by remote attackers to install a malware…
This website uses cookies.