Home Security Vulnerability

Vulnerability

Discovered New Malware That Spies On You Through Your Headphones

Discovered New Malware That Spies On You Through Your Headphones

0
Now hackers can spy on you through your headphones. Everyday we hear about some dangerous piece of smartphone malware or some new way for hackers to keep tabs on what we’re up to. But recently, researchers...
FireEye Hack a Corporate Network just by Sending an Email

Researchers from Google Discovered How to Hack a Corporate Network just by Sending an...

0
What if, with a single email, an attacker could monitor all traffic on a supposedly protected network? Researchers from Google’s Project Zero found, and silently reported, a bug in FireEye security software that allowed attackers...
MediaTek Powered Android Smartphones Vulnerable

Software Bug Put Several MediaTek Powered Android Smartphones Vulnerable to Attack

0
If you own a Android device which is powered by MediaTek chipsets, then your device is vulnerable to cyber attack. Yes recent reports officially confirms that a software bug in MediaTek powered Android smartphones...
Android malware and adware news

20% of adware installed on Android smartphones cannot be uninstalled, and antivirus is ineffective

0
According to a recent discovery by researchers from cybersecurity firm Kaspersky states that almost 20% of the adware installed in smartphones cannot be uninstalled, and the antivirus is ineffective to protect your...
stagefright 2.0

Stagefright 2.0 Vulnerability Compromised 1 Billion Android Phones With Hoaxer Audio Files

0
Stagefright  vulnerability was first discovered in April, the vulnerability allowed attackers to target Android phones over text or MMS, exploiting a weakness in Android's multimedia preview function. And after three months its happening again, this...
Linux computers at risk

Vulnerability in Popular Bootloader Puts Locked-Down Linux Computers at Risk

0
A new major vulnerability in Grub2 bootloader has been in found in Linux computers that can can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And...
wireless mouse vulnerability

New wireless mouse vulnerability could let hackers to take over your computer

0
Those who are using wireless mouse, I had a bad news for you. Security researchers found that a vulnerability in wireless mouse from popular manufactures could let hackers to take over the computer or...
Crash Google Chrome

Bug Reported : A Simple String Can Crash Google Chrome

0
Recently a new bug has been found in Google Chrome browser, that Typing in a 16 character link and hitting enter, clicking on a 16-character link, or even just putting your cursor over a 16-character...