Vulnerability

Widespread Bluetooth Vulnerabilities Uncovered in Major Operating Systems

Marc Newlin, a software engineer at Skysafe, has identified critical vulnerabilities...

Over 700 Smartphone Models at Risk: Researchers Uncover 5G Network Vulnerabilities

A team of researchers from the Singapore University of...

New Security Flaw ‘BLUFFS’ Threatens Encrypted Bluetooth Connections Worldwide

A new set of vulnerabilities known as BLUFFS (Bluetooth...

Researchers Exposed Fingerprint Authentication Flaw in Windows Hello

Researchers at Blackwing Intelligence have identified vulnerabilities in the...

Google’s HTTP/2 Vulnerability Leads to Record-Breaking DDoS Attacks

A recent vulnerability in Google's HTTP/2 protocol has not...

Log4Shell: Log4j Vulnerability Threatens Cybersecurity Worldwide

The recently discovered vulnerability known as Log4Shell is currently causing chaos on the internet, as cyber defenders try to fix the flaw while cybercriminals...

Security Experts Discovered Malware Intended For Windows Subsystem For Linux

Lumen's Black Lotus Labs, which specialize in network security, report on their blog about malware that was written in Python and created as a Linux ELF...

BrakTooth Vulnerabilities In Various Bluetooth SoCs Put Billions Of Devices At Risk

Security researchers at the Singapore University of Technology and Design have found 16 security flaws in commercially used Bluetooth stack implementations, which they summarize under the...

WhatsApp Vulnerability Allowed Attackers To Access Users’ Private Data From The Application Memory

WhatsApp was affected by a security vulnerability that allowed attackers to access users' private data through the application's memory. According to the cybersecurity firm Check Point...

iOS Bug Disables Wi-Fi On iPhones When You Join Hotspot With A Specific Network Name

A new iOS bug has been discovered that completely blocks the Wi-Fi on iPhones if it joins a network with a very specific network...

M1RACLES: Asahi Linux Developer Discovered A Design Flaw In Apple M1 Chip

During reverse engineering for the Linux port, Asahi Linux developer Hector Martin has found a design flaw in the Apple Silicon M1 chip that can be...

Kobalos: Unique Multiplatform Malware Threatens Supercomputers Around The World

After analyzing attacks against several large supercomputers in Asia and America, ESET security researchers warn of a new type of malware directed especially against supercomputers. The new...

KRACK WPA2 Wi-Fi Vulnerability Compromises Almost All Devices That Supports Wi-Fi

WPA2 (Wi-Fi Protected Access II) — the WiFi security protocol which considers safeguarding a vast majority of wifi connections has now been compromised to...

Websites can use your phone’s battery status to track you online

Researchers from Stanford University - Steve Engelhard and Arvind Narayanan,  recently found that your smartphone's battery status may now provide a way for websites to track...

Google bypassed China’s Great Firewall for 105 Minutes

We know that China is not that much fond to Google and its services so they are blocking Google with their Great Firewall but...

New wireless mouse vulnerability could let hackers to take over your computer

Those who are using wireless mouse, I had a bad news for you. Security researchers found that a vulnerability in wireless mouse from popular...

Newly Discovered iPhone Vulnerability Can Bypass Your Lockscreen Code

Locking your iPhone with passcode is the popular choice of most people to keep their iPhone safe from prying eyes. But researchers have  discovered a...