Vulnerability

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable
Vulnerability

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable

If you own a smart home, then you may probably be aware of Belkin Wemo Insight smart plug. Yes, it helps you to turn off your lights and appliances, and…

Read More
Yet Another WordPress Hack Exploiting Plugin Vulnerabilities
Vulnerability

Yet Another WordPress Hack Exploiting Plugin Vulnerabilities

Here comes news about another WordPress website security breach carried out by exploiting plugin vulnerabilities. Reports say that hackers have been exploiting vulnerabilities in a popular social media sharing plugin…

Read More
Serious Vulnerabilities Detected in the WPA3 Protocol
Vulnerability

Serious Vulnerabilities Detected in the WPA3 Protocol

Almost one year after its launch, some very serious vulnerabilities that could lead to online password cracking have been detected in the next-generation Wi-Fi security standard WPA3. It was in…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack
Vulnerability

68% of Firms, Moderate to Extremely Vulnerable To Internal Threats

With malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news sites, it is still not the main cause…

Read More
How To Deal With DNS Vulnerabilities?
Vulnerability

How To Deal With DNS Vulnerabilities?

Believe it or not, in the early days of the Internet, all the domain names (nodes) it had been listed in just one file, the host file. Today, the host…

Read More
Google Photos Vulnerability that Lets Retrieve Image Metadata
Vulnerability

Google Photos Vulnerability that Lets Retrieve Image Metadata

A vulnerability that was detected in the web version of Google Photos could be used by hackers to retrieve image metadata. ZDNet reports, “Google has patched a bug in its…

Read More
Old WinRar Bug Caused Trouble For Users
Vulnerability

Due To Disabled Auto-Update: Old WinRar Bug Caused Trouble For Users

Just like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security vulnerability from being taken advantage of by 3rd…

Read More
Vulnerabilities Discovered in Swiss E-Voting System
Vulnerability

Vulnerabilities Discovered in Swiss E-Voting System

Technical flaws were detected in the Swiss government’s electronic voting system. A team of cybersecurity researchers on Tuesday found this defect which could enable outsiders to replace legitimate votes with…

Read More
WordPress Plugin WooCommerce is Vulnerable to XSS Attacks
Vulnerability

WordPress Plugin WooCommerce is Vulnerable to XSS Attacks

As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into the bandwagon effect. Plugins are a double-edged sword;…

Read More
ICO Slaps Equifax with Maximum Fine for the 2017 Data Breach
Vulnerability

Equifax’s Senate Investigation: What Went Wrong?

Remember Equifax? The ill-fated credit monitoring company, which fell to massive cyberattacks. The United States Senate Committee on Homeland Security and Governmental Affairs released their committee report titled: “How Equifax…

Read More

Page 2 of 11

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register