Category

Industry News
Cisco Network Products
Cisco is currently looking into its product line to determine which products and services use Linux kernel 3.9 or above, which is vulnerable to the FragmentSmack denial-of-service (DoS) bug.  The networking hardware manufacturer already assembled a list of more than 80 products that are affected by the vulnerability. Many of them expect a fix by...
Continue Reading
Hotel Guest Fined for Hacking Hotel Wifi
A security engineer from Chinese multinational company Tencent hacked into the WiFi system of a hotel in Singapore and received a fine for publicly disclosing administrator login passwords. Zheng Dutao participated in the capture-the-flag competition during the Hack InThe Box security conference in Singapore at the end of August and decided to test the WiFi...
Continue Reading
The Uncertain Future of Gaming Technologies
People spend 2.5 billion minutes a day playing League of Legends.” That was part of the keynote speech from Jane McGonigal, Director of game research and development for the Institute for the Future at the 2018 Security Congress. To put that in perspective, that’s the equivalent of having a company of more than 20 million...
Continue Reading
Microsoft Windows Patch That Broke PCs
If your organization’s Windows 7 PCs failed to install Microsoft’s two most recent monthly rollup updates or the September security-only update, it’s because the affected systems were missing a servicing stack update (SSU) that Microsoft released in October 2016. Microsoft is preparing to rerelease a two-year old update for Windows 7 that’s necessary to avoid...
Continue Reading
Even Food Delivery Companies Get Hacked
Food delivery startup DoorDash has received dozens of complaints from customers who say their accounts have been hacked. DoorDash is now a $4 billion company after raising $250 million last month, and serves more than 1,000 cities across the U.S. and Canada. Dozens of people have tweeted at @DoorDash with complaints that their accounts had...
Continue Reading
Digital Skimming Attack
British Airways routes is telling an extra 185,000 travelers that their credit card information may have been stolen in an as of late uncovered Magecart Advanced Skimming Assault on its site and applications. The aircraft uncovered in an announcement on Thursday that the site related break found in September really influenced an additional 77,000 clients...
Continue Reading
ZIP-extraction feature compromised in New Windows10 Vulnerability
Windows 10 does not demonstrate an overwrite signal when clients extricate documents to an envelope that as of now contains the records. A client may unintentionally overwrite a record and have no chance of recuperating. As far back as the most recent rendition of Windows 10 was discharged on the October 2018 refresh (construct 1809),...
Continue Reading
Credit Card info
The data gathered by con artists incorporates clients’ names, email addresses, card numbers, expiry dates, CVC numbers and that’s just the beginning. Clients have been encouraged to screen their credit card reports for any uncommon action. Another McAfee technical support trick has been found focusing on clients’ close to home and Mastercard data. This program...
Continue Reading
The Donald Trump Dating App Just Exposed Its Users’ Data
“Make America Date Again!” That’s the website for the dating app Donald Daters reads. The app is marketed towards Donald Trump supporters who may want to find like-minded people. On Monday, Fox News reported that “users can chat for free when a match is mutual, block any potential liberals that troll them and Donald Daters...
Continue Reading
Vulnerability In Microsoft Word Exposed
Analysts at Israel-based cyberattack reproduction organization Cymulate are professing to have discovered a weakness in Microsoft Word’s online video include that can enable pernicious performing artists to supplant real YouTube iframe code with noxious HTML/JavaScript code. In an organization public statement, Cymulate cautions that the unpatched zero-day imperfection requires no extraordinary arrangement to imitate and...
Continue Reading
1 2 3 4 5