.

vulnerability

Zero day vulnerability in Windows OS and Internet Explorer exploited

A research carried out by Kaspersky Labs has confirmed that hackers recently launched a cyber attack on a South Korean company by leveraging a...

Vulnerability in the 5G network make mobile phones susceptible to eavesdropping

As the world is preparing to make a shift from 4G to 5G network, researchers from the Horst Gortz Institute for IT Security (HGI)...

Apple to send iPhones to hackers to find vulnerabilities

All you ‘White Hat’ hackers over there get ready for the iOS Security Research Device (SRD) program where a selected set of hackers from...

Fast Chargers filled with Security Vulnerabilities says a research

Every new portable gadget these days is now being assisted by a ‘Fast Charging’ feature and factually the said feature has become a necessity...

Chinese wireless cameras in UK are filled with espionage related software...

As per the survey conducted by consumer watchdog ‘Which’ more than 100,000 wireless cameras manufactured by Chinese company HiChip and installed in UK are...

Conduent ransomware attack and its Citrix Server Vulnerability

Conduent, a Business Process services company headquartered in New Jersey, America was reportedly hit by a ransomware attack on May 29th,2020. The company has...

A vulnerability in Google Cloud earns $31k

A security researcher from South America was awarded $31,337 as a bug bounty reward for finding a bug in the Google Cloud. And the...

New York Government dealt with Computer Vulnerability before Corona pandemic

Even before the dreaded Corona Virus spread its wings in New York, the government over there had to deal with an unreported emergency that...

Microsoft Windows document vulnerability has no fix

Microsoft has issued an official warning that the recently discovered font vulnerability has no fix as of now and users need to wait till...

Android vulnerability leads to malware scare

Kaspersky Lab has found a serious vulnerability in the Android operating system which can be used by hackers to launch malware attacks and steal...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!