Category: Vulnerability

Researchers Discover Android Variant of Dreaded iOS Spyware Pegasus

The infamous Pegasus malware, a strain of spyware that is known to target iOS devices now has a cousin in Chrysaor, an Android variant that can steal and compromise the world’s most widely used...

Read more arrow_forward

CIA Blasts WikiLeaks for Publishing Breached Secret Documents

The Central Intelligence Agency (CIA) has lambasted WikiLeaks, accusing the whistleblower organization of endangering the lives of Americans after releasing a trove of CIA hacking tools and secretive...

Read more arrow_forward

The US Air Force’s Updated Radar E-3G Planes Are 'Highly Vulnerable' to Hacking

The US Air Force’s fleet of E-3 Sentry radar plans, spanning 32 E-3s around the world that possess powerful radar and communication systems are due to get an upgrade from their decades-old computer...

Read more arrow_forward

IoT Teddy Bear Leaks 2 Million Recordings of Parents’ and Kids’ Messages

The manufacturer of Internet-connected “smart” teddy bears has leaked the credentials of over 800,000 user accounts and millions of personal messages between parents and their children, which...

Read more arrow_forward

2016 Windows Exploitations

Over the course of 2016, vulnerabilities in Internet Explorer and Edge were fixed after numerous exploitations. According to statistics, the number of vulnerabilities exploited from the outside in...

Read more arrow_forward

Hacker Finds Glaring Vulnerabilities in Apple’s Notification Feature

A buggy new notification feature that was found to contain multiple significant vulnerabilities by a security researcher has seen Apple pullback and disable the feature entirely. Released for users...

Read more arrow_forward

Cunning Gmail Phishing Attack is Even Tricking Savvy Users

A new Gmail-targeting phishing attack is fooling account owners into giving malicious hackers access to their Gmail accounts. The attack works with hackers sending emails to contacts of compromised...

Read more arrow_forward

Report: WhatsApp ‘Backdoor’ Leaves Encrypted Communication Vulnerable

New research has claimed that the way in which popular messaging platform WhatsApp has implemented its end-to-end encryption protocol leaves it vulnerable to outsider attacks. WhatsApp, a messaging...

Read more arrow_forward

Trump’s Cybersecurity Advisor Rudy Giuliani Runs an Insecure Website

Rudy Giuliani, the former New York mayor who is now appointed by President-elect Donald Trump as his special advisor on cybersecurity is facing a potentially embarrassing faux pas. Security experts...

Read more arrow_forward

3 Million Android Devices Vulnerable Due to a Dangerous Pre-Installed Rootkit

Nearly three million Android devices are vulnerable to a man-in-the-middle (MiTM) attack, researchers have discovered, leaving these devices vulnerable to attackers who can remotely take full control...

Read more arrow_forward

A Billion Mobile Apps are Vulnerable to Account Hijacking

Three researchers from the University of Hong Kong have determined that third-party applications that allow for single sign-on processes via Facebook and Google by supporting the OAuth 2.0 protocol...

Read more arrow_forward

Reveal of Hacked Servers Marketplace xDedic Throws up a Surprise

It was last week when security firm Kaspersky reported on an underground marketplace called xDedic, a platform for buying and selling access to compromised RDP servers. Some 70,000 hacked servers...

Read more arrow_forward

Johnson & Johnson Issues Warning of Insulin Pump Cyber Exploit

Medical device manufacturer Johnson & Johnson is warning patients about a cybersecurity bug that could lead to a potential exploit in one of its insulin pumps. If compromised, a hacker...

Read more arrow_forward

Tesla Releases Patch after Hackers Remotely Hijack Moving Car

Tesla has rushed to release a patch within 10 days of Chinese white hat hackers’ (security researchers) discovery of vulnerabilities within the Model S’ control system that allowed for an...

Read more arrow_forward

The Great Data Hunt

By Yoran Sirkis, CEO of Covertix Quick. Just in your head – try to count all the places your corporate data may reside – network, cloud, corporate and private mobile devices, laptops,...

Read more arrow_forward

DHS Wants Windows Users to Uninstall Apple’s Quicktime

Citing security firm Trend Micro, the Department of Homeland Security has issued a timely alert to Windows users, reminding them that Apple has ended QuickTime support for Windows, leaving them...

Read more arrow_forward

Critical Vulnerability Within Microsoft Secure Channel Allows Remote Code Execution

Make sure you patch your systems immediately. Exploits taking advantage of this critical vulnerability are already in the works.

Read more arrow_forward

Why is Facebook this Slow to Patch Security Holes?

Serious security hole not patched almost a year after it was reported to the social media giant. Why?

Read more arrow_forward

73,000 Private IP Security Cameras Are Accessible to Anyone

There is apparently 73,000 unprotected IP security cameras throughout the world. See if yours is among them and learn how to configure it properly

Read more arrow_forward

iOS Masque Attack: A Worrisome Attack Targeting iOS 7+ Devices

Are you an iPhone or an iPad user? A worrisome vulnerability within iOS allows attackers to install impostor apps on your device and steal sensitive information.

Read more arrow_forward

Highly Critical Drupal SQL Injection Vulnerability Affects Millions of Websites

Up to 12 million websites compromised by exploiting a highly critical vulnerability within Drupal. Follow these steps to get your site back to safety.

Read more arrow_forward

A New England Bank's Flawed Early Implementation of Chip Cards Allowed Unauthorized Charges

A series of unauthorized fraudulent EMV charges from Brazil baffled a small bank from New England recently. The bank is one of many that are starting to roll out the new EMV (chip-based) cards. The...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.