Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices in the market. If you are having Bluetooth enabled devices then you are vulnerable to BlueBorne...
Cloak & Dagger

Beware!! All Android Versions Up to 7.0 are Vulnerable to Toast Overlay Attack

Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control the UI feedback loop and take over the device — without giving the user a chance to...

New Apache Struts Vulnerability Allows Attackers to Take Control Over Web Servers

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on Apache Struts. Security Expert from Man Yue Mo from lgtm found a remote code execution vulnerability...

PowerPoint file Equipped with CVE-2017-0199 could Compromise Your System

Security experts from FortiGuard Labs discovered a malicious Powerpoint file in name ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx using the CVE-2017-0199 Vulnerability.By opening, this malicious PDF file may compromise your system. CVE-2017-0199 was originally a zero-day remote code execution vulnerability...
Flash Player

Adobe Flash Player Bug that can Leak Windows User Credentials

Adobe published a new version of Flash player in the middle of this week covering the Security issues under CVE-2017-3085 that affects all the platforms of windows(Windows XP, Vista, 7, 8.x and 10). This flaw was identified by Security researcher...


Signup to get Hacking News & Tutorials to your Inbox

Most Popular