Critical Cisco security Authentication Bypass Vulnerability leads to hack thousands of home routers

Remote unauthenticated control over a vulnerable ISP's gear, could allow an attacker to log into the software as an administrator and remotely take control of thousands upon thousands of customers' home routers, broadband gateways and similar boxes. Cisco said ,The...

Researchers Find Backdoor Account in 80 Different “SONY” IP...

  Researchers in Austria have unearthed a pair of backdoor accounts in more than 80 different IP camera models made by Sony Corp.     Separately, Israeli security experts have discovered trivially exploitable weaknesses in nearly a half-million white-labeled IP camera models that are not currently...

Global Cyber Security Firm “Comodo Threat Research Labs” (CTRL) Detects New Family of Sophisticated...

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6),...

NTP patch for Dos exploit released

NTP can be exploited to generate huge volumes of junk traffic which leads to DOS attack. Update your NTP service to ntp-4.2.8p9 which patches this Vulnerability. What is NTP? Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over...

Twitter mistakenly suspended its own CEO’s Twitter account

Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting 8:45 p.m. EST, his account status showed as “suspended.” Dorsey’s account was restored about half hour later, and at 9:15 p.m....

Most Popular

Recommended