Hey Guys Today Here i m with a new Article On Exploit [ File Upload ] Vulneability In Joomla Sites …
Privacy-focused Tails 1.1.2 Operating System Released
Tails, a Linux-based highly secure Operating System specially designed and optimized to preserve users’ anonymity and privacy, has launched its …
Apple — Most Mac OS X Users Not Vulnerable to ‘Shellshock’ Bash Bug
On one hand where more than half of the Internet is considering the Bash vulnerability to be severe,
Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
Yahoo! was recently impacted by a critical web application vulnerabilities which left website’s database and server vulnerable to hackers.
Malicious Advertisements Found on Java.com, Other High-Profile Sites
A New York-based online ad network company AppNexus, that provides a platform specializing in real-time
Hacking Gmail App with 92 Percent Success Rate
A group of security researchers has successfully discovered a method to hack into six out of seven popular Smartphone apps,
Cyber Attacks Explained: Wireless Attacks
Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables …
Android “Fake ID” Vulnerability Allows Malware to Impersonate Trusted Apps
Due to the majority in the mobile platform, Google’s Android operating system
Kronos: A new Banking Trojan for sale in Underground forums
Researchers from Trusteer have discovered a new Banking Trojan dubbed as “Kronos” which is being sold in the Underground forum. The malware …
50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability
The users of WordPress, a free and open source blogging tool as well as content management system (CMS), that have …