Friday , September 22 2017
Home / Tag Archives: vulnerability

Tag Archives: vulnerability

Get Linux Root Shell Just By Pressing ‘ENTER’ key for 70 Seconds + Fix

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds. The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted …

Read More »

From Today Onwards, Don’t You Even Dare to Use Microsoft Internet Explorer

Yes, from today, Microsoft is ending the support for versions 8, 9 and 10 of its home-built browser Internet Explorer, thereby encouraging Windows users to switch on to Internet Explorer version 11 or its newest Edge browser. Microsoft is going to release one last patch update for IE8, IE9 and …

Read More »

Simple Yet Effective eBay Bug Allows Hackers to Steal Passwords

A simple, yet effective flaw discovered on eBay’s website exposed hundreds of millions of its customers to an advance Phishing Attack. An Independent Security Researcher reported a critical vulnerability to eBay last month that had the capability to allow hackers to host a fake login page, i.e. phishing page, on eBay website in …

Read More »

Juniper Firewalls with ScreenOS Backdoored Since 2012

Juniper Networks has announced that it has discovered “unauthorized code” in ScreenOS, the operating system for its NetScreen firewalls, that could allow an attacker to decrypt traffic sent through Virtual Private Networks (VPNs). It’s not clear what caused the code to get there or how long it has been there, …

Read More »

Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel

Ever wonder how to hack Instagram or how to hack a facebook account? Well, someone just did it!But, remember, even responsibly reporting a security vulnerability could end up in taking legal actions against you. An independent security researcher claims he was threatened by Facebook after he responsibly revealed a series …

Read More »

You can Hack into a Linux Computer just by pressing ‘Backspace’ 28 times

So what would anyone need to bypass password protection on your computer? It just needs to hit the backspace key 28 times, for at least the computer running Linux operating system. Wait, what? A pair of security researchers from the University of Valencia have uncovered a bizarre bug in several …

Read More »

13 Million MacKeeper Users Hacked — 21 GB of Data Exposed

MacKeeper anti-virus company is making headlines today for its lax security that exposed the database of 13 Million Mac users’ records including names, email addresses, usernames, password hashes, IP addresses, phone numbers, and system information. MacKeeper is a suite of software that claims to make Apple Macs more secure and …

Read More »

TrueCrypt Encryption Software Has Two Critical Flaws: It’s time to Move On

If you are among thousands of privacy-conscious people who are still using ‘no longer available’ TrueCrypt Encryption Software, then you need to pay attention. Two critical security vulnerabilities have been discovered in the most famous encryption tool, TrueCrypt, that could expose the user’s data to hackers if exploited. James Forshaw, Security …

Read More »

KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk

Beware Windows Users! A new dangerous unpatched Zero-day Vulnerability has been detected in the latest version of WinRAR affects over millions of users worldwide. WinRAR is one of the most popular utility program used to compress and decompress files with more than 500 Million installations worldwide. The WinRAR RCE vulnerability lie …

Read More »

Critical OS X Flaw Grants Mac Keychain Access to Malware

Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code thateven fits in a tweet. The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the …

Read More »