Privilege Escalation Vulnerability in Lenovo Transition Application

Privilege Escalation Vulnerability in Lenovo Transition Application

Summary Description: A vulnerability was identified in the Lenovo Transition program specific to some Lenovo Yoga, Flex and Miix systems running Windows where a user...
GPS

Trackmageddon – Location Tracking Services (GPS) Vulnerabilities Allow to Access Unauthorized GPS Location Data

Security researchers discovered multiple vulnerabilities dubbed "Trackmageddon" which affects GPS services and online location tracking devices. The vulnerabilities with GPS location tracking devices allow an...

Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft –...

Critical Microsoft Edge Vulnerability Allows to  steal  the cookies and password revealed by Recent Research by  PoC (Proof-of-Concepts) .This Vulnerability Discovered under bypass...
Single SMS WAP Crap can Break Samsung Galaxy phone

How a Single SMS with WAP Crap can Break your Samsung Galaxy phone

Security researchers from Contextis disclosed a bug in Samsung Galaxy phones that can be triggered remotely with SMS, which when combined give chances to ransomware...
Exploit Kit

Hackers Distributing Variety of New Exploits and Malware via Microsoft Office Document Exploit Kit

Newly discovered Microsoft office document exploit kit contains a variety of recent exploits and Malware such as Lokibot, Formbook and tracking kit called such...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security