Browsing Category
Security
Critical vulnerability discovery on Joomla SQL million sites at risk hack
All websites based on Joomla 3.2 or later are vulnerable to a serious bug SQL-injection, corrected by the company with a patch released last Thursday to be installed immediately.
Millions of websites used for e-commerce or other…
Adobe releases patch for the critical vulnerability in Flash here as a download
Adobe seems to have solved the problems of critical vulnerability reported last week, for which he was even advised to uninstall Flash.
As reported by Adobe itself, last week, there was a critical vulnerability in Adobe Flash, for which…
Critical vulnerability in Adobe Flash: You have to uninstall it immediately
Do not end the flaws for Adobe Flash: reveal the existence of new high-risk vulnerabilities.
After only one day of the issuance of monthly security patches for its software, including Flash Player, Adobe confirms the presence of a…
BadUSB: the most serious security flaw on USB is now public
It was released the source code of BadUSB, a security flaw that allows you to modify the firmware of any USB device.
Security researchers Adam Caudill and Brandon Wilson published the source code for a vulnerability in the firmware of…
USB Killer: The USB stick frying destroy PC components
A researcher has shown proof-of-concept of running a USB stick which, when connected to a PC, can destroy instantly integrated components, making it completely unusable.
A researcher known by the pseudonym Dark Purple showed a USB stick…
Apple publishes a list of the Top 25 app vulnerable to XcodeGhost
Apple has published the list of the most important applications, including those containing malware XcodeGhost or who have been recently content.
A few days ago we wrote that iOS was susceptible to malware because of some compromised…
Malware on 6,000 sites based on WordPress
A large number of websites based on WordPress is exploited to take control of users' computers. Still unknown the cause before, but we think of a vulnerability in a plugin platform CMS.
The security firm Sucuri has published a speech on…
Serious breach of WhatsApp Web, millions of users at risk hack
WhatsApp Web for months has been exposed to a very serious security vulnerability that has made it possible to attackers to take full control of a system remotely.
The Israeli security firm Check Point discovered a critical vulnerability…
KeyRaider: More than 225,000 stolen credentials on iPhone jailbroken
iPhones subject to jailbreak may be victims of malware that steals your Apple, to make them available to the other two software can make purchases on the App Store without making payments.
It was recently discovered a family of malware…
Android Pattern Lock, the vulnerability is the same password and pin
The approach that the average user uses the composition of a pattern for locking / unlocking of Android phones is the same one used to create passwords and pin: laziness user still has the upper hand.
The computer security incidents…
The BitTorrent protocol amplifies DoS attacks.
Exploiting some vulnerability of the BitTorrent protocol, a single user can launch a DoS attack that is then amplified up to 120 times by other network nodes.
A group of security researchers has identified a vulnerability of the…
ESET detects more than 50 fake-app on the Play Store
Many applications from app decked best known as Dubsmash or Clash of Clabs, instead contain malware that hijacks the user to fraudulent sites.
The security firm ESET has issued a notice with which says it has identified the Trojan…
Vulnerability in Windows (already resolved) raises the risk of attacks via USB drive
Microsoft yesterday released the patch to fix a privilege elevation vulnerability that exposes the risk of attacks via USB drive, similar to what has enabled the spread of the Stuxnet malware.
All currently supported versions of Windows…
A flaw in Mac OS X Yosemite exposes users to the risk of malware
A flaw present in Yosemite and discovery in recent weeks has already been exploited to create installer compromises can scale and privileges to install software without the user.
A bug in the latest version of OS X Forwards offers a…