Security researchers discovered multiple vulnerabilities dubbed “Trackmageddon” which affects GPS services and online location tracking devices. The vulnerabilities with GPS …
phpMyAdmin CSRF Vulnerability Allows An Attacker to Deleting Records From Database
A new Critical CSRF Vulnerability discovered in widely used phpMyAdmin open source admin tool allows an attacker perform harmful database …
GoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices
A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead …
Janus Vulnerability – Hackers to Modify Android Apps Code Without Affecting Their Signatures
Janus Vulnerability, a new flaw discovered in Android apps that is capable of modifying the Android app’s code without making …
Keylogger Discovered in HP Notebook Keyboard Drivers
HP Notebook Drivers contains Keylogger vulnerability that can be abused by hackers and steal the user’s information which could be …
DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code
A Banking Trojan called DOWNAD has been discovered after 9 years that is capable of remotely inject malicious code into …
Facebook Image Removal Vulnerability allows Users to Delete any Photos
Facebook recently introduced a poll feature which allows users to make votable questions as the status on both Android and …
Linux Distributions Suffering with Denial of Service by systemd Vulnerability
A Linux Suffering from systemd(System and Service Manager) vulnerability that leads to performing a Denial of Service in many Linux …
Anti Virus Software’s Design Flaw Leads to Bypass Windows Local Privilege
A new Antivirus design flow has discovered and named as AVGater for the Windows Local Privilege Escalation Vulnerability which is …
All Versions of MS Office Affected with Critical Zero-day Vulnerability Allows Attackers Take Full Control of your System
A Critical MS Office Zero-day Remote Code Execution Vulnerability discovered in Microsoft Office that could allow attacker to take complete …