Vulnerability

Attacks Targeting Recent PHP Framework Vulnerability Found
Vulnerability

Attacks Targeting Recent PHP Framework Vulnerability Found

New attacks that target a recent PHP framework vulnerability have been detected. It was last month that a code vulnerability was detected in the ThinkPHP framework; ThinkPHP is a rapid-development…

Read More
The Contents Of The Microsoft January 2019 Patch Tuesday
Vulnerability

The Contents Of The Microsoft January 2019 Patch Tuesday

As the 2019 Windows update season starts, we are set to witness the last full year of Windows 7 support, while Windows 8.x and 10 will continue to receive updates…

Read More
Nasty Side-Channel Attack Vulnerability (Again) In Windows & Linux Discovered
Vulnerability

Nasty Side-Channel Attack Vulnerability (Again) In Windows & Linux Discovered

A new variant of side-channel attack is recently discovered being actively exploited in the wild against Windows and Linux targets. Publicly revealed in a paper titled ‘Page Cache Attacks’ published…

Read More
13 Privilege Escalation Bugs For CleanMyMac X Discovered, Updated Fix in Version 4.2.0 Released
Vulnerability

13 Privilege Escalation Bugs For CleanMyMac X Discovered, Updated Fix in Version 4.2.0 Released

In the Windows platform, the use of system cleaning tools such as CCleaner has been a regular part used for Windows computer housekeeping. Same housekeeping is required with a Mac,…

Read More
Almost 19,500 Orange Modems Leaking WiFi Credentials
Hacks Vulnerability

Almost 19,500 Orange Modems Leaking WiFi Credentials

This is becoming a real headache for customers of Orange Livebox ADSL modem in France and Spain during the Christmas season; almost 19,500 modems have been discovered leaking WiFi credentials….

Read More
Facebook’s New Dilemma, Silently Patched
Vulnerability

Facebook’s New Dilemma, Silently Patched

Facebook has silently patched a vulnerability very recently that enabled 3rd party sites to extract user information without seeking the consent of individual users first. The aggregate data extraction includes…

Read More
Used Data Storage Devices Have Security Flaws
Vulnerability

Used Data Storage Devices Have Security Flaws

According to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data protection. They say a malicious expert with direct…

Read More
DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor
Vulnerability

DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor

Just like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…

Read More
The Responsible Disclosure of Software Vulnerabilities in the Nutshell
Vulnerability

The Responsible Disclosure of Software Vulnerabilities in the Nutshell

Computer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation of high-profile computer viruses and worms that have…

Read More
The Importance of Application Security Approach in Today’s Computing
Vulnerability

The Importance of Application Security Approach in Today’s Computing

Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…

Read More

Page 1 of 8

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register