Just two days ago, a mobile security company, Adaptive Mobile, which discovered the Simjacker attack, released a list of local …
Researcher reveals an overflow on the Linux rtlwifi driver on P2P
A security researcher said that serious security vulnerabilities in Linux could cause nearby devices that use WiFi signals to crash …
Alert: Please update Google Chrome to the latest version now
Two serious zero-day vulnerabilities have been fixed in the emergency patch released yesterday by Google, and one of them has …
Linux kernel maintainer: Intel chip security issues will exist for a long time
Greg Kroah-Hartman, a stable kernel maintainer, said in a keynote speech at the Open Source Summit Europe that the security …
Former Yahoo Employee Pleads Guilty for Hacking into 6,000 Yahoo accounts
Former Yahoo employee pleads guilty for hacking into 6,000 Yahoo users accounts in search of personal records such as private …
Top 7 Vulnerability Databases to Trace New Vulnerabilities
Vulnerability defined as the weakness that allows the attacker to enter in and harm, it may be a flaw in …
U.S Files Lawsuit Against Edward Snowden for Publishing his Book
The united states department of justice filed a LawSuit against Edward Snowden for publishing a book violating the non-disclosure agreements …
CWE Top 25 (2019) – List of Top 25 Most Dangerous Software Weakness that Developers Need to Focus
MITRE has released a list of Top 25 Most Dangerous Software Errors (CWE Top 25) that are widely spread and …
Simjacker Vulnerability – Attackers take Control Over Mobile Phones via an SMS Message
Security researchers disclosed a new attack dubbed Simjacker, that can be exploited by sending an SMS containing a specific type …
How Hackers Possibly Penetrate F-35 Fighter Jet – Guide to F-35’s Tech and Cybersecurity
Cybersecurity is an evolving market, and organizations are always advised to keep their network armed and secured against cybercriminals. Considering …