Vulnerability
- News
Microsoft Furious at Google for Revealing Windows 10 Vulnerability
Earlier, Google revealed the existence of a “particularly serious” vulnerability in Windows 10, one that it had warned Microsoft about 10 days previously but had not been patched. Microsoft has now responded to the disclosure – made by Google’s Threat Analysis Group – and the company is not happy. “We…
Read More » - News
Tesla Model S Remotely Hacked By Researchers
Tesla’s Model S may be one of the most technologically advanced vehicles on the road, with its large suite of features and Autopilot system. Unfortunately, now researchers have managed to use this to their own advantage, identifying a number of security vulnerabilities in the electric car that could facilitate…
Read More » - News
Talos Security Find Security Bugs in iOS and Mac OS X
Cisco’s Talon security team are good at their job, so good in fact that they have now revealed not just one but multiple security vulnerabilities that put both iOS devices and Mac OS X devices at risk! The bugs have since been fixed, with each of the five vulnerabilities addressed in…
Read More » - News
Intel CPUs Could Contain Huge Security Flaw
A management technology present in Intel x86 CPUs for the past decade might contain a massive vulnerability which, if exploited, could leave systems vulnerable to “nearly unkillable, undetectable rootkit attacks.” According to a report by BoingBoing, the Intel Management Engine (ME) – which allows administrators to remotely access and control…
Read More » - News
Symantec Vulnerability Exposes Three Operating Systems All At Once
When it comes to security holes, there are a few things that you don’t want to create security holes. One of these things is your anti-virus software and yet, Symantec’s antivirus engine did just that. The vulnerability was discovered by Google’s Travis Ormandy, and not only did it open up…
Read More » - News
What Happens When A Hacker Forum Is Hacked?
These days security is everything, and when you get hacked the last thing you want is for people to start selling your data. This is where Nulled.io came in, a hacker forum that was designed to sell passwords, bitcoins and any kind of data you want. That was until they…
Read More » - News
Hack Pornhub and Earn $25,000
Pornhub has partnered with HackerOne to offer rewards, ranging between $50 and $25,000, to hackers who can find flaws and vulnerabilities in its adult content site. HackerOne has worked with a number of different companies and organisations – including a recent partnership with the Pentagon – to encourage “white hat”…
Read More » - News
SAP Bug Still Exposing Companies Six Years After Being Patched!
We are constantly reminded about keeping our software up to date, from something like Word to the auto-updates of Windows 10. Amongst all the features and tweaks we often get with these updates, the first and foremost reason for fixes and updates is often security, with each update fixing another problem…
Read More » - News
Old Versions of Android Vulnerable to Malvertising Ransomware Attack
While Google continually works hard in order to make each version of their Android operating system more and more secure, users of older versions of Android are still left vulnerable to attack. It has been discovered that attackers have been making use of two known exploits that exist on older…
Read More » - News
iOS Lock Screen Bypass Vulnerability Fixed By Apple
Apple has reportedly fixed a security flaw in the iOS operating system that would allow attackers to be able to bypass passcode lock screens on iPhone 6S and 6S Plus that are running version 9.3.1 of iOS. The bypass would have allowed malicious parties to be able to access the…
Read More » - News
39 Android Flaws Fixed in Major Security Patch
Google’s latest patch for their Android operating system is one of the biggest security patches ever released for the OS. This monthly security update covers 39 vulnerabilities that had been found, of which 15 were of the highest rating, critical, which mean they could be used to lead to total…
Read More » - News
iOS Mobile Device Management Protocol Can be Abused to Load Malware
Apple has worked hard to make it difficult to allow users to unwittingly install unauthorized and malicious apps onto their devices. Despite this, there is still one way in that attackers are still able to exploit: the mobile device management protocol. Researchers from Check Point Software Technologies will be…
Read More » - News
Stagefright Vulnerability Now a Serious Threat to Android Devices
The Stagefright vulnerability in Android is nothing new, however for a long time it was (mostly) harmless due to difficulties in reliably using the flaw for malicious purposes Unfortunately for Google and Android users, researchers at Isreali cyber-security firm NorthBit have developed a proof-of-concept exploit, named Metaphor, based on…
Read More »