Venom security vulnerability(CVE-2015-3456) in the virtual floppy drive code used by computer virtualization platforms. This will be allows an attacker to escape a virtual machine on certain open source hyper-visors. This is very serious vulnerab...
Venom Vulnerability Allows an Attacker to Escape a Virtual Machine on Hypervisors
XSS Zero-day Vulnerability in WordPress, Millions of Websites Affected
WordPress was issued a critical security Patch to users, after millions of websites were at risk of a bug that allows attackers to take control of a system. If your WordPress site allows users to post comments via the WordPress commenting system,...
Google Launches Password Alert Chrome Extension To Protect Users Password from Phishers
On Wednesday, Google has announced the release of a new Chrome browser extension "Password Alert" designed to protect its users from phishing attacks. This is free and open-source Chrome extension that protects your Google and Google Apps for Work...
FBI Warns WordPress Users, Regarding Pro-ISIS Hackers Script Kiddies
On Tuesday, Researchers at the FBI continue to identify WordPress vulnerabilities as the door through which ISIS hackers are able to spread propaganda. The FBI said that the low-level attacks are from those seeking the notoriety of being associat...
Google Launches Data Saver Extension for Chrome to Optimizes Web Pages
Google has recently released a Data Saver extension for Chrome Browser, bringing the company’s data compression feature currently in beta to the desktop for the first time. You can download the extension from the Chrome Web Store. This new Data...
WordPress Plugin "Google Analytics by Yoast" Patches Critical Vulnerability
Google Analytics by Yoast is a WordPress plug-in for monitoring website traffic. With approximately seven million downloads it’s one of the most popular WordPress plug-ins. A security vulnerability in the plug-in allows an unauthenticated attac...
Drupal Patches Critical Admin Password Reset URLs Vulnerability
Drupal is a free and open-source content-management framework written in PHP and distributed under the GNU General Public License. It is used as a back-end framework for at least 2.1% of all Web sites worldwide. According to Security advisories, ...
Aware About Hot Picture and Video Links in Facebook
Aware about new phishing websites that were created to look identical to authentic Facebook pages, Phishing is common across the Internet and redirects to the malicious sites. Facebook users are in for a surprise if only they click on links pro...
New Drupal SQL Injection Vulnerability, Websites are Open to Attack
Drupal's security team has released an service announcement calling upon all users of the Drupal content management framework to consider their sites as compromised. Admin area of sites that run Drupal 7 should upgrade to 7.32 to guard against po...
Inventor of World Wide Web warns of threat to internet
The British inventor of the World Wide Web warned on Saturday that the freedom of the internet is under threat by governments and corporations interested in controlling the web. Tim Berners-Lee, a computer scientist who invented the web 25 year...
Google Online Security: Gradually sunsetting SHA-1
The SHA-1 cryptographic hash algorithm has been known to be considerably weaker than it was designed to be since at least 2005 nine years ago. Collision attacks against SHA-1 are too affordable for us to consider it safe for the public web PKI. C...
Critical Vulnerability in Joomla Allows Hacker to Gain Admin Access
Critical security vulnerability found in most popular e-commerce extension "VirtueMart" for the Joomla, it is discovered by Security researchers at Sucuri. This vulnerability could be used by a malicious user to easily gain Super-Admin privileges...
Average Internet of Things device has 25 security flaws
The Internet of Things (IoT) has connected everything from smoke alarms to fridges and cars, making life easier and safer – but it has also given hackers a new way to attack their victims, warns HP. In a study of the ten most popular IoT devices ...
WordPress New Vulnerability: Remote Code Execution through TimThumb plugin
New vulnerability found in WordPress, A zero-day vulnerability in the popular TimThumb plugin for WordPress leaves many websites vulnerable to exploits that allow unauthorized attackers to execute malicious code. The vulnerability involved poor h...
Free Guide for WordPress Security Checklist
WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL, which runs on a web hosting service. Features include a plug-in architecture and a template system. WordPress is used by more than 18...
Google’s Public DNS Intercepted in Turkey
Google had received several credible reports and confirmed with our own research that Google’s Domain Name System (DNS) service has been intercepted by most Turkish Internet Service Providers. According to Google Online Security, DNS server tells...
Threat Intelligence on Domain Registrars
A new foundation aims to prevent cyber crime by making sure the domain name industry receives the needed intelligence to immobilize criminals. The Secure Domain Foundation (SDF) is a Canadian incorporated not-for-profit organization dedicated to ...
Update::XSS Vulnerability Found in World's Top Universities Websites
Security researcher Mr.brahm is found the XSS(cross site scripting) Vulnerability in Worlds top Universities Harvard University, Stanford University, Rice University, University OF Michigan Websites. they used other exploits to upload any file. C...
Namecheap Cross-site Request Forgery Vulnerability
Security researcher Henry Hoggard has discovered a cross site request forgery(CSRF) vulnerability in the Namecheap website that could lead attackers to hijack the DNS records. Namecheap’s DNS setup page was vulnerable to Cross Site Request Forger...
New Back Door worm-type Threat Found on Apache Tomcat running Servers
Symantec has discovered a new back door worm-type threat on Apache Tomcat running servers.This threat should be little different from the ones we usually encounter every day. Back door type Trojan horses and worms let attackers execute various co...
Socialize