Home Security Vulnerability


Microsoft's Windows Subsystem For Linux

Security Experts Discovered Malware Intended For Windows Subsystem For Linux

Lumen's Black Lotus Labs, which specialize in network security, report on their blog about malware that was written in Python and created as a Linux ELF binary. What makes it special is that this malware is...
BrakTooth Vulnerabilities

BrakTooth Vulnerabilities In Various Bluetooth SoCs Put Billions Of Devices At Risk

Security researchers at the Singapore University of Technology and Design have found 16 security flaws in commercially used Bluetooth stack implementations, which they summarize under the name "Braktooth". According to researchers, these vulnerabilities in the Bluetooth Classic...
essential Android apps for WhatsApp users

WhatsApp Vulnerability Allowed Attackers To Access Users’ Private Data From The Application Memory

WhatsApp was affected by a security vulnerability that allowed attackers to access users' private data through the application's memory.According to the cybersecurity firm Check Point Research (CPR), WhatsApp was affected by a vulnerability that, if exploited,...
Get More Space on iPhone

iOS Bug Disables Wi-Fi On iPhones When You Join Hotspot With A Specific Network...

A new iOS bug has been discovered that completely blocks the Wi-Fi on iPhones if it joins a network with a very specific network name. The problem will force the user to have to...

M1RACLES: Asahi Linux Developer Discovered A Design Flaw In Apple M1 Chip

During reverse engineering for the Linux port, Asahi Linux developer Hector Martin has found a design flaw in the Apple Silicon M1 chip that can be exploited to allow different applications to communicate discreetly with each...
WLAN news and stories

Design Flaws In WLAN Protocol Make The Majority Of Devices Vulnerable

With the so-called Fragattacks (Fragmentation and Aggregation Attacks), the security researcher Mathy Vanhoef, known for his work on Krack Attack, has again presented a series of design errors in WLAN protocols that can be exploited for attacks...
Qualcomm Modem vulnerability

A Flaw in Qualcomm Modem Makes 30% Of Android Phones Vulnerable

The Israeli security firm Check Point Research has discovered a vulnerability in Qualcomm's MSM (Mobile Station Modem) that affects millions of Android phones around the world.The firm claims that MSM is an integral part...
Spectre Is Back

Spectre Is Back: Side-Channel Attacks On AMD Ryzen And Intel Core Is Possible

It has been three years since the microprocessor industry first had to deal with the existence of the Specter attack. Over time, many variants of Spectre have emerged, mitigated by existing patches or new fixes.But now,...