Friday, April 20, 2018
Vulnerability

Vulnerability

On each category you can set a Category template style, a Top post style (grids) and a module type for article listing. Also each top post style (grids) have 5 different look style. You can mix them to create a beautiful and unique category page.

Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones

I have an Android phone with a five different gmail accounts configured in it. But what if any one of them get compromised via...

Samsung Flaw Lets Hacker Easily Take Control of Your Galaxy Mobile...

More than 600 Million users of Samsung Galaxy smartphones, including the newly released Galaxy S6, are potentially vulnerable to a software bug that allows hackers to...

Hacking Traffic Lights is Amazingly Really Easy

Hacking Internet of Things (IoTs) have become an amazing practice for cyber criminals out there, but messing with Traffic lights would be something more crazy for...

‘Google Analytics by Yoast’ WordPress Plugin Patches Critical Vulnerability

Another popular WordPress plugin by Yoast has been found to be vulnerable to a critical flaw that could be exploited by hackers to hijack...

Hacking Team Spyware preloaded with UEFI BIOS Rootkit to Hide Itself

Last Week someone just hacked the infamous Hacking Team, The Italy-based cyber weapons manufacturer and leaked a huge trove of 400GB internal data, including: Emails Hacking...

Hurray! Unlocking Your Cell Phone is Officially Legal Again

President Barack Obama signed a bill into law Friday that aims to make it legal for consumers to “unlock” their cell phones in order...

Emergency Patch released for Latest Flash Zero-Day Vulnerability

Two days ago, The Hacker News (THN) reported about the Zero-day vulnerability in the freshly patched Adobe Flash Player. The vulnerability was exploited in...

Zero-Day Exploits for Stealing OS X and iOS Passwords

I think you'll agree with me when I say: Apple devices are often considered to be more safe and secure than other devices that run...

POODLE SSL Vulnerability Now Attacking TLS Security Protocol

POODLE, a critical SSL flaw discovered in October that was patched and fixed by webmasters around the world after Google alerted software and hardware...

Hackers Can Remotely Hack Self-Aiming Rifles to Change Its Target

High-tech Sniper Rifles can be remotely hacked to shoot the wrong target – Something really scary and unpredictable.  Yes, Hackers can remotely gain access to...