Vulnerability

How To Deal With DNS Vulnerabilities 1

How To Deal With DNS Vulnerabilities?

Believe it or not, in the early days of the Internet, all the domain names (nodes) it had been listed in just one file, the host file. Today, the host…

Read More
Google Photos Vulnerability that Lets Retrieve Image Metadata 1

Google Photos Vulnerability that Lets Retrieve Image Metadata

A vulnerability that was detected in the web version of Google Photos could be used by hackers to retrieve image metadata. ZDNet reports, “Google has patched a bug in its…

Read More
Open EDR
Old WinRar Bug Caused Trouble For Users

Due To Disabled Auto-Update: Old WinRar Bug Caused Trouble For Users

Just like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security vulnerability from being taken advantage of by 3rd…

Read More
Vulnerabilities Discovered in Swiss E Voting System 1

Vulnerabilities Discovered in Swiss E-Voting System

Technical flaws were detected in the Swiss government’s electronic voting system. A team of cybersecurity researchers on Tuesday found this defect which could enable outsiders to replace legitimate votes with…

Read More
WordPress Plugin WooCommerce is Vulnerable to XSS Attacks 1

WordPress Plugin WooCommerce is Vulnerable to XSS Attacks

As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into the bandwagon effect. Plugins are a double-edged sword;…

Read More
ICO Slaps Equifax with Maximum Fine for the 2017 Data Breach

Equifax’s Senate Investigation: What Went Wrong?

Remember Equifax? The ill-fated credit monitoring company, which fell to massive cyberattacks. The United States Senate Committee on Homeland Security and Governmental Affairs released their committee report titled: “How Equifax…

Read More
New Google Chrome Zero Day Vulnerability Detect

New Google Chrome Zero-Day Vulnerability Detected

A new Google Chrome zero-day vulnerability, which is being actively exploited in the wild, has been detected. Clement Lecigne, a security researcher who is part of Google’s Threat Analysis Group,…

Read More
Important Features of Vulnerability Scanners

Important Features of Vulnerability Scanners

To identify vulnerabilities that can compromise your security, performance, or functionality, you need to have a vulnerability assessment in place. It is a method used by a qualified provider of…

Read More
Vulnerability Helps Researchers Expose Malware CC Servers

Vulnerability Helps Researchers Expose Malware C&C Servers

We usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around; the criminals are at the receiving end. A…

Read More
Printer Vulnerabilities Report Reveals Cybersecurity Risk

Printer Vulnerabilities Report Reveals Cybersecurity Risk

Quocirca, a market insight consulting firm has posted their Global Print Security Landscape 2019 report, which publicly revealed that 60% of corporate entities globally are exposed to data breach due…

Read More

Page 4 of 13

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register