Vulnerability

Facebook’s New Dilemma, Silently Patched
Vulnerability

Facebook’s New Dilemma, Silently Patched

Facebook has silently patched a vulnerability very recently that enabled 3rd party sites to extract user information without seeking the consent of individual users first. The aggregate data extraction includes…

Read More
Used Data Storage Devices Have Security Flaws
Vulnerability

Used Data Storage Devices Have Security Flaws

According to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data protection. They say a malicious expert with direct…

Read More
DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor
Vulnerability

DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor

Just like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…

Read More
The Responsible Disclosure of Software Vulnerabilities in the Nutshell
Vulnerability

The Responsible Disclosure of Software Vulnerabilities in the Nutshell

Computer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation of high-profile computer viruses and worms that have…

Read More
The Importance of Application Security Approach in Today’s Computing
Vulnerability

The Importance of Application Security Approach in Today’s Computing

Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…

Read More
Tesla Model S Stolen, Thieves Hack the Keyless Entry System
Vulnerability

Tesla Model S Stolen, Thieves Hack the Keyless Entry System

A Tesla Model S was stolen recently in Essex, England after a pair of thieves hacked the car’s high-tech keyless entry system. The whole incident, however, got recorded on the…

Read More

What Do We Need to Know About the 2018 Global DNS Threat Report
Vulnerability

What Do We Need to Know About the 2018 Global DNS Threat Report?

Just like the healthcare industry, the financial market players are also a profitable target of cybercriminal elements. The Global DNS Threat Report 2018 by Efficient IP has released a report…

Read More
7 Useful Android Vulnerability Scanners
Vulnerability

7 Useful Android Vulnerability Scanners

There is a huge difference between an Android antivirus and an Android app that offers vulnerability scans. The former has questionable effectiveness due to the way Google developed Android as…

Read More
The Highly Competitive Web Application Firewall Market
Vulnerability

The Highly Competitive Web Application Firewall Market

The Internet continues to be a rich environment for vulnerability scans against weak websites and web hosting facilities. Businesses with a web presence are the most attacked entities on the…

Read More
TOP 10 PHP Vulnerability Scanners
Vulnerability

TOP 10 PHP Vulnerability Scanners

In today’s world, automation is the name of the game. People expect a faster way to do the job, to meet deadlines and settle obligations. Same goes with the security…

Read More

Page 1 of 8

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register