Hacking

Android 4.3 and Earlier affected by Critical Code-Execution Flaw

A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you…

11 years ago

Critical flaw in TimThumb plugin menaces the WordPress world

A critical vulnerability in the WebShot feature implemented by TimThumb plugin expose WordPress instance to Remote Code Execution attacks. The…

11 years ago

PayPal two-factor authentication for mobile apps is flawed

Security experts at Duo Security have discovered a serious flaw in the implementation of two-factor authentication which allow attackers to…

11 years ago

More than 32000 servers expose admin passwords in the clear

More than 32000 servers containing motherboards manufactured by Supermicro expose admin passwords in the clear, it is a godsend for…

11 years ago

LinkedIn vulnerable to MITM attack that leverages an SSL stripping could expose users data at risk

Security experts at Zimperium firm revealed that LinkedIn users could be potentially vulnerable to Man-in-the-Middle attacks leveraging an SSL stripping.…

11 years ago

Towelroot, how to root a Android devices with a click

The popular hacker George Hotz, also known as Geohot, as releases a one click tool dubbed Towelroot to root Android…

11 years ago

Protecting Brazil 2014 World Cup from cyber attacks

The Italian security firm Tiger Security issued a report on the current state of cyber attacks against the organization of…

11 years ago

AT&T suffered a data breach,users urge to change passcode

The American multinational giant AT&T confirmed to have suffered a data breach last April, personal data of an unknown number…

11 years ago

Change in App permissions raises privacy and security issues

A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions…

11 years ago

Air-gap network hacking technique, infects systems via cellphone even if isolated from the Internet

Israeli researchers presented the air-gap network hacking technique to compromise a system, even if it is isolated from the Internet,…

11 years ago

This website uses cookies.