Tag

vulnerability
phishing sites
Summary HTTPS green padlock symbol may no longer indicate secured connection. Analysis There has been a steady increase in threat actors’ use of SSL certificates to add an air of legitimacy to malicious websites. Since 2017 almost a third of phishing sites had SSL certificates, meaning their URLs began with HTTPS:// and (most) browsers displayed...
Continue Reading
Hackers Can Utilize Hardware Vulnerability of Chips to Perform Remote Attacks
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to security flaws though, and its latest vulnerability is a big one.   Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...
Continue Reading
Sony smart TVs
Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.   The vulnerability resides in the Photo Sharing Plus which allows users to upload photos to Sony Smart TV through a smartphone. It affects not only the TV’s used at the home but also the...
Continue Reading
Wireless Chipsets Affects Billions of Devices
ThreadX is a real-time operating system (RTOS) developed by Express Logic, capable of running in a rich set of different platforms and devices. It is actually the most deployed RTOS, with over 6.2 billion deployments, including IoT (Internet of Things) devices, modems, laptops such as Samsung Chromebooks and Microsoft Surface, and even gaming consoles like...
Continue Reading
Website Vulnerability
The city of Columbia site had a security flaw in its search tool, according to independent security researchers. The flaw lets anyone view passwords for the website’s database and email protocol servers, creating a massive potential for abuse, researchers said on Thursday.   The vulnerability made it possible for someone to pull sensitive data out...
Continue Reading
Magento PayPal
Hacker groups and online fraudsters are mishandling a component of Magento online shops to test the validity of stolen debit and credit card numbers. The transactions are executed against Magento stores that support the PayPal Payflow Pro integration. The PayPal Payflow Pro integration is a payment option available on Magento shops that enables an online...
Continue Reading
DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability
DJI makes some of the most mainstream quadcopters available, yet its items have more than once drawn investigation from the United States government over protection and security concerns. Most as of late, the Department of Defense in May restricted the buy of customer rambles made by a bunch of merchants, including DJI. Presently DJI has...
Continue Reading
Evernote for Windows
A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when...
Continue Reading
DNS burrowing
A security analyst as of late reached MyBroadband to report a weakness in the MTN arrange that could enable programmers to get free information utilizing DNS burrowing.   The Domain Name System (DNS) is an arrangement of servers on the Internet which empower the interpretation of comprehensible spaces, as mtn.co.za, into Internet Protocol addresses.  ...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability
Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too....
Continue Reading
1 2