Security researchers at Google have discovered several serious flaws affecting the NTP protocol, which are remotely exploitable by the attackers. Security experts at Google have uncovered several serious flaws in the Network Time Protocol (NTP), including several buffer overflows that are remotely exploitable. The Network Time Protocol is a networking protocol for clock synchronization between […]
A security expert discovered a critical CSRF vulnerability in Blogger.com that allows an attacker to write posts in any blog hosted on the popular platform. The Egyptian security expert Mazen Gamal Mesbah (@MazenGamal) has discovered a critical CSRF (Cross-site request forgery) vulnerability in the free weblog publishing tool Blogger.com. The vulnerability could be exploited by an attacker to write posts […]
Google has simplified the authentication process by introducing an updated CAPTCHA that simply asks users whether they are a bot. Google’s new API simplifies the reCAPTCHA experience, product manager Vinay Shet said. Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of […]
A researcher at Google discovered a critical flaw in Windows Acrobat Reader 11 Sandbox that could be exploited to access a system and gain higher privileges Google security researcher James Forshaw claims that the Acrobat Reader Windows sandbox is affected by critical vulnerability that could allow attackers to compromise a system and gain higher privileges. “The […]
A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]
Security experts at Google and McAfee have discovered a new Zero-day vulnerability in Microsoft OLE being exploited in targeted attacks. Early this week, Microsoft issued the security advisory 3010060 to warn its customer of a new Zero-Day vulnerability that affects all supported versions of Windows OS except, Windows Server 2003. The OLE Packager is the component that is affected by the zero-day, […]
Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new wave of targeted attacks which were stolen information through Google Drive. The researcher detected a new strain of data stealer malware, dubbed Drigo, that is apparently used in hacking […]
Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key. Google firm considers cyber security a pillar of its business, the last initiative announced by the company is the introduction of an improved two-factor authentication system for its services, including Gmail. The new 2FA process is based on the use of a […]
The Fappening 4 – The fourth wave of nude celebrity photos hacked from the iCloud system was leaked online, new stars victimized including a male. A new episode of the Fappening Saga is out, online comes the fourth archive (the Fappening 4), of celebrity nude photos leak, and for the happiness of women the collection includes the photos […]
FBI Director James Comey said that he was “very concerned” about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about the improvements made by Apple and Google for their solutions to defend the security and privacy of the users. The companies have implemented encryption by default on […]