libcurl has had authentication leak bug dated back to before September 1999

8 years ago

According to a security advisory, libcurl is affected by a couple of issues, one of them might cause the leakage of authentication data…

New HNS botnet has already compromised more than 20,000 IoT devices

8 years ago

A new botnet called Hide 'N Seek (HNS botnet) appeared in the threat landscape, the malware is rapidly spreading infecting unsecured…

Critical code execution flaw in Electron framework impacts popular Desktop apps such as Skype and Signal

8 years ago

A critical RCE vulnerability in the Electron framework impacts popular desktop applications, including Skype, Signal, Slack, GitHub Desktop, Twitch, and…

Are you a Tinder user? Watch out, someone could spy on you

8 years ago

Experts at security firm Checkmarx discovered two security vulnerabilities in the Tinder mobile apps that could be exploited to spy…

Less than 10% of Gmail users enabled two-factor authentication

8 years ago

According to Google software engineer Grzegorz Milka, less than 10 percent of its users have enabled two-factor authentication (2FA) for their…

Bell Canada suffers a data breach for the second time in less than a year

8 years ago

Bell Canada is notifying customers about a data breach that exposed personal data of roughly 100,000 individuals, this is the…

Satori’s threat actors are behind the new Masuta botnet that is targeting routers in the wild

8 years ago

Masuta botnet targets routers using default credentials, one of the versions analyzed dubbed “PureMasuta” relies on the old network administration…

According to TrendMicro Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018

8 years ago

According to a report published by the security firm TrendMicro, Business Email Compromise (BEC) attacks could reach $ 9 billion…

Intel recommended to stop deploying the current versions of Spectre/Meltdown patches

8 years ago

Intel recommended OEMs, cloud service providers, system manufacturers, software vendors as well as end users to stop deploying the current…

WordPress plugins and themes vulnerabilities statistics for 2017

8 years ago

WordPress plugins and themes vulnerabilities statistics for 2017. The statistics were derived from our up-to-date WordPress Vulnerabilities Database. We are monitoring a…

This website uses cookies.