You searched for: Pierluigi Paganini

Experts found Joker Spyware in 24 apps in the Google Play store

Security experts at Google have removed from Google Play 24 apps because they were infected with a new spyware tracked…

6 years ago

Google report on iPhone hack created ‘False Impression,’ states Apple

Apple replied to Google about the recent report suggesting iPhones may have been hacked as part of a long-running hacking…

6 years ago

Experts add a BlueKeep exploit module to MetaSploit

Maintainers of the open-source Metasploit penetration testing framework have added a public exploit module for the BlueKeep Windows flaw. There is a surprise…

6 years ago

Thousands of servers infected with the Lilocked Ransomware

A new ransomware tracked as Lilocked (or Lilu) by researchers is actively targeting servers and encrypting the data stored on them. The…

6 years ago

CVE-2019-15846 Exim mail server flaw allows Remote Code Execution

A security flaw in Exim mail servers could be exploited by local or remote attackers to execute arbitrary code with…

6 years ago

PHP new versions fix multiple code execution issues

Maintainers at the PHP programming language have released new versions that address multiple flaws, including some code execution issues. The…

6 years ago

Over 600k GPS trackers left exposed online with a default password of ‘123456’

600,000 GPS trackers left exposed online with a default password of '123456' Avast researchers found at least 600,000 GPS trackers…

6 years ago

Zero-day vulnerability in Android OS yet to be patched

Maintainers of the Android Open Source Project (AOSP) failed to address a privilege escalation bug in the Android mobile OS…

6 years ago

Hundreds of millions of Facebook users’ phone numbers exposed online

New problems to Facebook, phone numbers associated with more than 400 million accounts of the social network giant were exposed…

6 years ago

Year-Old Samba flaw allows escaping from the share path definition

Experts discovered a year-old flaw in Samba software that could be exploited to bypass file-sharing permissions and access forbidden root…

6 years ago

This website uses cookies.