In the digital world, it just takes one click to get the keys to the kingdom.
Do you know spear-phishing was the only secret weapon behind the biggest data breach in the history?
It’s true, as one of the Yahoo employees fell victim to a simple phishing attack and clicked one wrong link that let the hackers gain a foothold in the company’s internal networks.
Today, Kaspersky Lab released a new version of its virtualization security solution, Kaspersky Security for Virtualization Agentless, which has achieved VMware® Ready™ for Networking and Security status and is now certified for use with VMware NSX.
Are you clicking nude selfies? That is fine and not any criminal act, but this act can land you in trouble — here’s how!
Almost three years after a wave of private photographs of celebrities leaked online, “The Fappening 2.0” appears to be underway with the circulation of alleged naked pictures of female celebrities, including Emma Watson and Amanda Seyfried on Reddit and 4chan.
A buffer overflow vulnerability exists in Real Networks Netzip Classic. The vulnerability is due to improper boundary check error while handling ZIP files. A remote attacker can exploit this vulnerability to execute an arbitrary code on the victim’s computer.
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
A Stack buffer overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.