Facebook has fixed a serious logic flaw that could have been exploited by hackers to delete any video uploaded in comments on someone’s Facebook post. Facebook has fixed a serious security vulnerability in the Facebook’s platform that could have been exploited by hackers to delete any video uploaded in comments on someone’s Facebook post. The security […]
Today I propose you an interview with Rahul Sasi, the Founder of Machine learning based cloud security company CloudSek. Rahul Sasi (@fb1h2s) is the Founder of Machine learning based cloud security company CloudSek. He was an Admin member for Garage4hackers.com. He is ePrior to founding CloudSek he was a Sr Engineer at Citrix where he held […]
PayPal has fixed a vulnerability that could have been exploited by attackers to deliver malicious images through the payment pages of the website. The Security researcher Aditya K Sood discovered a vulnerability that could have been exploited by attackers to deliver malicious image through the payment pages of the PayPal website. The expert noticed that the […]
Fansmitter is a new acoustic data exfiltration method devised by a group of researchers from Ben-Gurion University of the Negev. We all know that air-gapped networks aren’t totally secure, in the past, many research groups have devised methods to steal data from computers disconnected from the Internet. It is possible, for example, to exfiltrate data […]
This disclosure of an unpatched Remote Code Exec flaw in the Swagger API framework compromises NodeJS, Ruby, PHP, and Java. Swagger is a representation of RESTful API that allows developers to get interactive documentation, client SDK generation and discoverability. The Swagger generators are privileged tools for organisations to offer developers easy access to their APIs. Currently, the […]
Researchers discovered more than a dozen flaws in Uber app and websites, many of them allow hackers to access driver and passenger info. Security experts from the Integrity firm have found more than a dozen flaws in the Uber website that could be exploited by hackers to access driver and passenger data. The researchers discovered a total […]
WordPress has recently issued the version 4.5.3 that patches more than two dozen vulnerabilities, including 17 bugs introduced in the last three releases. WordPress is one of the most popular content management systems for this reason is a privileged target of hackers. It is quite easy to scan the web searching for websites running old version affected […]
Experts from Cisco Talos discovered multiple security issues in the Libarchive library that is used by hundreds of other projects, including FreeBSD. Security vulnerabilities in the popular open source compression toolkit Libarchive affect countless of other projects that include the library. The flaw was discovered by experts from the Cisco Talos team that supported the Libarchive development team to […]
Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits. Godless is a new strain of malware that uses multiple rooting exploit to compromise Android mobile devices. The mobile malware is a sort of hacking platform that includes an open-source rooting framework called android-rooting-tools. The […]
Like the FBI Director Comey also Zuckerberg use tapes to cover the webcam of his laptop, evidently he fear that someone could spy on him. A Facebook post published by Mark Zuckerberg to celebrate more than 500 million people now use Instagram is attracting the attention of IT experts. In the image that is included in the […]