Hackers are exploiting a new zero-day flaw in GPON routers

Even after being aware of various active cyber attacks against the GPON Wi-Fi routers, if you haven’t yet taken them off the Internet, then be careful—because a new botnet has joined the GPON party, which is exploiting an undisclosed zero-day vulnerabi… Continue reading Hackers are exploiting a new zero-day flaw in GPON routers

Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

Chinese security researchers have discovered more than a dozen vulnerabilities in the onboard compute units of BMW cars, some of which can be exploited remotely to compromise a vehicle.

The security flaws have been discovered during a year-long securi… Continue reading Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks

A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system.

The vulnerability, tracked as CVE-2018-1111, could allow… Continue reading Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks

Adobe Releases Critical Security Updates for Acrobat, Reader and Photoshop CC

Adobe has just released new versions of its Acrobat DC, Reader and Photoshop CC for Windows and macOS users that patch 48 vulnerabilities in its software.

A total of 47 vulnerabilities affect Adobe Acrobat and Reader applications, and one critical rem… Continue reading Adobe Releases Critical Security Updates for Acrobat, Reader and Photoshop CC

Simple bug could lead to RCE flaw on apps built with Electron Framework

A critical remote code execution vulnerability has been discovered in the popular Electron web application framework that could allow attackers to execute malicious code on victims’ computers.

Electron is an open source app development framework that … Continue reading Simple bug could lead to RCE flaw on apps built with Electron Framework

Google Makes it Mandatory for OEMs to Roll Out Android Security Updates Regularly

Security of Android devices has been a nightmare since its inception, and the biggest reason being is that users don’t receive latest security patch updates regularly.

Precisely, it’s your device manufacturer (Android OEMs) actually who takes time to … Continue reading Google Makes it Mandatory for OEMs to Roll Out Android Security Updates Regularly

New Rowhammer Attack Can Hijack Computers Remotely Over the Network

Exploitation of Rowhammer attack just got easier.

Dubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer attack on the targeted systems just by sending specially crafted packets to the vulnerable network cards o… Continue reading New Rowhammer Attack Can Hijack Computers Remotely Over the Network

Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

Shortly after Microsoft announced support for custom JavaScript functions in Excel, someone demonstrated what could possibly go wrong if this feature is abused for malicious purposes.

As promised last year at Microsoft’s Ignite 2017 conference, the co… Continue reading Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

Security researchers revealed a way around that some hacking groups have been found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks.

Dubbed Safe Li… Continue reading Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

Twitter is Testing End-to-End Encrypted Direct Messages

Twitter has been adopting new trends at a snail’s pace. But it’s better to be late than never.

Since 2013 people were speculating that Twitter will bring end-to-end encryption to its direct messages, and finally almost 5 years after the encryption era… Continue reading Twitter is Testing End-to-End Encrypted Direct Messages