New Privilege Escalation Flaw Affects Most Linux Distributions

An Indian security researcher has discovered a highly critical flaw in X.Org Server package that impacts OpenBSD and most Linux distributions, including Debian, Ubuntu, CentOS, Red Hat, and Fedora.

Xorg X server is a popular open-source implementation… Continue reading New Privilege Escalation Flaw Affects Most Linux Distributions

Google Makes 2 Years of Android Security Updates Mandatory for Device Makers

When it comes to security updates, Android is a real mess.

Even after Google timely rolls out security patches for its Android platform, a major part of the Android ecosystem remains exposed to hackers because device manufacturers do not deliver patch… Continue reading Google Makes 2 Years of Android Security Updates Mandatory for Device Makers

Critical Code Execution Flaw Found in LIVE555 Streaming Library

Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media.

LIVE555 streaming medi… Continue reading Critical Code Execution Flaw Found in LIVE555 Streaming Library

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server wi… Continue reading LibSSH Flaw Allows Hackers to Take Over Servers Without Password

Google Will Charge Android Phone Makers to Use Its Apps In Europe

Would you prefer purchasing an Android device that doesn’t have any apps or services from Google? No Google Maps, No Gmail, No YouTube!

And NOT even the Google Play Store—from where you could have installed any Android apps you want

Because if you li… Continue reading Google Will Charge Android Phone Makers to Use Its Apps In Europe

New iPhone Bug Gives Anyone Access to Your Private Photos

A security enthusiast who discovered a passcode bypass vulnerability in Apple’s iOS 12 late last month has now dropped another passcode bypass bug that works on the latest iOS 12.0.1 that was released last week.

Jose Rodriguez, a Spanish amateur secur… Continue reading New iPhone Bug Gives Anyone Access to Your Private Photos

Google Adds Control-Flow Integrity to Beef up Android Kernel Security

Google has added a new security feature to the latest Linux kernels for Android devices to prevent it against code reuse attacks that allow attackers to achieve arbitrary code execution by exploiting control-flow hijacking vulnerabilities.

In code reu… Continue reading Google Adds Control-Flow Integrity to Beef up Android Kernel Security

Adobe Releases Security Patch Updates for 11 Vulnerabilities

Adobe has released its monthly security updates to address a total of 11 vulnerabilities in Adobe Digital Editions, Framemaker, and Technical Communications Suite, of which four are rated critical and rest 7 are important in severity.

Adobe has also r… Continue reading Adobe Releases Security Patch Updates for 11 Vulnerabilities

From Now On, Only Default Android Apps Can Access Call Log and SMS Data

A few hours ago the company announced its “non-shocking” plans to shut down Google+ social media network following a “shocking” data breach incident.

Now to prevent abuse and potential leakage of sensitive data to third-party app developers, Google ha… Continue reading From Now On, Only Default Android Apps Can Access Call Log and SMS Data

How to Start a Career in Cybersecurity: All You Need to Know

Cybersecurity is one of the most dynamic and exciting fields in tech, combining cutting-edge information technology with crime fighting. It’s also an industry in serious need of qualified professionals.

Estimates show that there are over one million u… Continue reading How to Start a Career in Cybersecurity: All You Need to Know