CVE/vulnerability
Millions of Windows & Linux Systems are Vulnerable to Remote Hack that Manufactured by Lenovo, Dell, HP and Others
Researchers discovered multiple unsigned firmware in various system components such as WiFi adapters, USB hubs, trackpads, and cameras used in Lenovo, Dell, HP and...
Cyber Security News
Linux Foundation Releases List of Most commonly used open-source Software & Security Problems
Linux Foundation and Harvard’s Lab identifies the most commonly used free and open-source software and the potential vulnerabilities associated.The Census II report determines the...
Computer Security
BusKill – A new USB Kill Cord Switch to Self-Destruct Your Data on Linux Machine
BusKill a new laptop kill cord Dead Man Switch for Linux machine to lock, shutdown, or to wipe out the linux machine, in case...
cyber security
Critical Linux Vulnerability Let Hackers Hijack VPN-Tunneled TCP Connections
Researchers from the University of New Mexico uncovered a critical Linux vulnerability that affects most of the Linux distros, allows attack Inferring and hijacking VPN-tunneled...
Computer Security
Messagetap – A New Malware Used by APT41 Hacker Group to Spy on SMS Traffic
A new malware dubbed "Messagetap" designed to monitor and record SMS traffic of certain phone numbers, IMSI numbers, and based on keywords for subsequent...
CVE/vulnerability
Critical Wi-Fi Bug In Linux Let Hackers Take Complete Control and Crash The System Remotely
A newly discovered critical Wi-Fi vulnerability in Linux lets attackers compromise the system with the help of nearby Wi-Fi devices and crush the vulnerable...
Computer Security
A Vulnerability In Linux Sudo Let the Restricted Linux Users to Run Commands as Root
A new vulnerability has been discovered in the Linux Sudo program let unprivileged users can run the command as root by specifying the user...
Cyber Security News
New Linux Malware “EvilGnome” Spying on Linux Desktop Users and Steal Sensitive Files
Researchers discovered a new Linux malware called "EvilGnome" with previously unseen functionalities that capable of creating a backdoor and spying the Linux desktop users.Based...