WordPress vulnerable to Cross-Site Request Forgery in Connection Information – Not yet fixed with...

 Wordpress vulnerable to Cross-Site Request Forgery in Connection Information - Not yet fixed with the last Update. WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used...

Smartphone Sensors can Spying your Mobile and Reveal PINs and Passwords by Tracking...

Security Experts Reveal that Smartphone sensors can be spying your mobile phone and steal the PINS and password by cyber criminals.This Technique mostly Target by the Malicious apps installations which can possibly capture the user movements by motion sensors. Security Experts from Newcastle...

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC...

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document. FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual...

Around 8 million websites affected by a critical Buffer Overflow Vulnerability resides in IIS...

Internet Information Services is an extensible web server made by Microsoft for use with the Windows NT family.IIS can help you achieve better performance, reliability, scalability, and security for your websites. The IIS6.0 zero-day flaw was found by two scientists with...

Apache Struts2 Remote Code Execution Vulnerability S2-046

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on Apache Struts. Apache Struts2 official released a security bulletin, the bulletin pointed out that Apache Struts2...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended