New Attack exploiting serious Bluetooth weakness
Researchers have demonstrated a serious weakness in the Bluetooth wireless standard that could allow hackers to...
Continue ReadingCritical flaw in VLC Media Player Found
A German cybersecurity agency, CERT-Bund, which is responsible for organizing the country’s response to any computer...
Continue ReadingNew EvilGnome Backdoor Spies on Linux Users, Steals Their Files
A new Linux malware masquerading as a Gnome shell extension and designed to spy on unsuspecting...
Continue Reading25 million Android devices get infected
The name ‘Agent Smith’ is usually associated with the famed Matrix movie trilogy. However, it is...
Continue ReadingNew vulnerabilities may let hackers remotely SACK Linux
The Linux and FreeBSD operating systems contain newly discovered vulnerabilities that make it easy for hackers...
Continue ReadingFacebook unveils global digital coin called Libra
Facebook today announced Libra, a new digital currency that aims to combine the best features of...
Continue ReadingRAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory
A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access...
Continue ReadingFacebook removed a staggering 2.19 billion fake accounts
Facebook in the first quarter of 2019 disabled a staggering 2.19 billion fake accounts, up from...
Continue ReadingGoogle reportedly ends business with Huawei
President Trump issued an executive order last week banning “foreign adversaries” from doing telecommunication business in...
Continue ReadingFirefox is having trust issues with add-ons
According to an announcement on Mozilla Discourse, a certificate used to sign Firefox add-ons expired some...
Continue ReadingDocker Hub hack exposed data of 190,000 users
Docker Hub, the official repository for Docker container images, has announced a security breach on late...
Continue ReadingTe latest Windows update breaks McAfee, Sophos, Avira, Avast
Affected machines seem to be fine until an attempt is made to log in, at which...
Continue Reading