Tag Archives: Vulnerability

Warning! Just an Image Can Hack Your Android Phone — Patch Now

Own an Android smartphone? Beware, as just an innocuous-looking image on social media or messaging app could compromise your smartphone.

Along with the dangerous Quadrooter vulnerabilities that affected 900 Million devices and other previously disclosed issues, Google has patched a previously-unknown critical bug that could let attackers deliver their hack hidden inside an innocent looking

Update your Mac OS X — Apple has released Important Security Updates

If you own a Mac laptop or desktop, you need to update your system right now.

It turns out that the critical zero-day security vulnerabilities disclosed last week, which targeted iPhone and iPad users, affect Mac users as well.

Late last week, Apple rolled out iOS 9.3.5 update to patch a total of three zero-day vulnerabilities that hackers could have used to remotely gain control of an

Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties’ communications.

Even the latest Android Nougat Preview is considered to be vulnerable.
<!– adsense –>
The security flaw was first

Car Thieves Can Unlock 100 Million Volkswagens With A Simple Wireless Hack

In Brief
Some 100 Million cars made by Volkswagen are vulnerable to a key cloning attack that could allow thieves to unlock the doors of most popular cars remotely through a wireless signal, according to new research.

Next time when you leave your car in a parking lot, make sure you don’t leave your valuables in it, especially if it’s a Volkswagen.

What’s more worrisome?

The new attack

Microsoft Releases 9 Security Updates to Patch 34 Vulnerabilities

In Brief
Microsoft’s August Patch Tuesday offers nine security bulletins with five rated critical, resolving 34 security vulnerabilities in Internet Explorer (IE), Edge, and Office, as well as some serious high-profile security issues with Windows.

A security bulletin, MS16-102, patches a single vulnerability (CVE-2016-3319) that could allow an attacker to control your computer just by

2 Hackers Win Over 1 Million Air Miles each for Reporting Bugs in United Airlines

Two computer hackers have earned more than 1 Million frequent-flyer miles each from United Airlines for finding and reporting multiple security vulnerabilities in the Airline’s website.

Olivier Beg, a 19-year-old security researcher from the Netherlands, has earned 1 Million air miles from United Airlines for finding around 20 security vulnerabilities in the software systems of the airline.

Warning! Over 900 Million Android Phones Vulnerable to New 'QuadRooter' Attack

Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide.

What’s even worse: Most of those affected Android devices will probably never be patched.

Dubbed “Quadrooter,” the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier

LastPass Bug Lets Hackers Steal All Your Passwords

A critical zero-day flaw has been discovered in the popular cloud password manager LastPass that could allow any remote attacker to compromise your account completely.

LastPass is a password manager that also available as a browser extension that automatically fills credentials for you.

All you need is to remember one master password to unlock all other passwords of your different online

KeySniffer Lets Hackers Steal Keystrokes from Wireless Keyboards

Radio-based wireless keyboards and mice that use a special USB dongle to communicate with your PC can expose all your secrets – your passwords, credit card numbers and everything you type.

Back in February, researchers from the Internet of things security firm Bastille Networks demonstrated how they could take control of wireless keyboards and mice from several top vendors using so-called