Windows Task Manager’s Zero day Vulnerability Detected by ESET

Windows Task Manager’s Zero-day Vulnerability, Detected by ESET

Windows Task Scheduler was Microsoft’s answer to Unix Cron, for the purpose of running applications, scripts, and batch commands on-schedule. It was first released as an add-on option for Windows…

Read More
Android OS API Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Android OS API-Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Researchers have uncovered an “API-breaking” vulnerability, which could expose Android device systems data to rogue apps. The sensitive information thus exposed could be misused by cybercriminals. Security researchers from Nightwatch…

Read More
Open EDR
Unpatched Remote Code Execution in Ghostscript Revealed by Google

Unpatched Remote Code Execution in Ghostscript Revealed by Google

Ghostscript, a mainstream raster image processor and back-end raster image converter for PDF has been discovered of harboring a critical vulnerability, a zero-day remote code execution flaw. Ghostscript is an…

Read More
MacOS AirMail 3 App Vulnerable to Email Leaks

MacOS AirMail 3 App, Vulnerable to Email Leaks

Windows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from 1993 till 2006. It was only until the…

Read More
Virtual Patching vs Unpatched Vulnerabilities Unleashed by Trend Micro

Trend Micros Launches Virtual Patching Vs. Unpatched Vulnerabilities

Trend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”. It is designed as a short-term stop-gap measure of preventing security…

Read More
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

How An Ex-Hacker From The NSA Dominated Def Con Conference

A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…

Read More
Routers and Internet of Things Most Attacked

Consumer Routers And IoT Are The Most Attacked Platforms

Microsoft, Apple, and Linux developers for decades have tried their very best to harden their operating system from security breaches, vulnerabilities, and bugs. Although not perfect, the three top operating…

Read More
Microsoft Cortana Vulnerability Allows Unauthorized Browsing on Locked Devices

Microsoft Vulnerability Allows Unauthorized Browsing

Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your locked system.  Researchers working at security firm McAfee…

Read More
5 Things to Know For a Successful Pen Testing

5 Things to Know For a Successful Pen Testing

Penetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The vulnerability report arising from pen test is a…

Read More
New Bluetooth Vulnerability

Intel Discovers And Publishes New Bluetooth Vulnerability

Turns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible devices. The reports say that the newly discovered…

Read More

Page 10 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register