hacking news

Experts found Joker Spyware in 24 apps in the Google Play store

Security experts at Google have removed from Google Play 24 apps because they were infected with a new spyware tracked…

7 years ago

Google report on iPhone hack created ‘False Impression,’ states Apple

Apple replied to Google about the recent report suggesting iPhones may have been hacked as part of a long-running hacking…

7 years ago

Experts add a BlueKeep exploit module to MetaSploit

Maintainers of the open-source Metasploit penetration testing framework have added a public exploit module for the BlueKeep Windows flaw. There is a surprise…

7 years ago

CVE-2019-15846 Exim mail server flaw allows Remote Code Execution

A security flaw in Exim mail servers could be exploited by local or remote attackers to execute arbitrary code with…

7 years ago

PHP new versions fix multiple code execution issues

Maintainers at the PHP programming language have released new versions that address multiple flaws, including some code execution issues. The…

7 years ago

Zero-day vulnerability in Android OS yet to be patched

Maintainers of the Android Open Source Project (AOSP) failed to address a privilege escalation bug in the Android mobile OS…

7 years ago

Year-Old Samba flaw allows escaping from the share path definition

Experts discovered a year-old flaw in Samba software that could be exploited to bypass file-sharing permissions and access forbidden root…

7 years ago

Twitter temporarily disables feature to tweet via SMS after CEO hack

Twitter opted to temporarily disable the feature that allows users to post tweets via SMS, in response to the hack…

7 years ago

Experts devised advanced SMS phishing attacks against modern Android-based phones

Experts warn of advanced phishing attacks in certain modern Android-based phones that can trick users into accepting new malicious phone…

7 years ago

JSWorm: The 4th Version of the Infamous Ransomware

Malware researchers at Yoroi-Cybaze ZLab have analyzed the fourth version of the infamous JSWorm Ransomware. Introduction The ransomware attacks have…

7 years ago

This website uses cookies.