CVE-2017-18005 – Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in valu …
Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF …
Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF …
Zurmo 3.2.3 allows XSS via the latitude or longitude parameter to …
Trustwave Secure Web Gateway (SWG) through 11.8.0.27 allows remote attackers to append an arbitrary public key to the device’s SSH …
Apple has publically apologized to its customers for slowing older iPhones in order to keep up with declining battery life. After all this …
If you are wondering why your WhatsApp is down, don’t worry, you are not alone the messaging service is down for many around the …
Paul Puey serves as the CEO of Edge, a cyber security company that empowers individuals to take control of their own online data by …
Americans in 2017 lived under a threat of constant surveillance, both online and offline. While the battle to curtail unaccountable and …
The movement to encrypt the web reached milestone after milestone in 2017. The web is in the middle of a massive change from non-secure …
Ripple has overtaken Ethereum as world’s second-largest cryptocurrency. Its XRP token climbed more than 50% on Saturday. …
There is no doubt about the fact that Nintendo Switch is currently the most sought-after device. However, the device is also prone to be hacked. …
Dreambot banking Trojan which is a variant of Ursnif spreading via resume themed email, it is one of the most active banking trojans.Its …
2017 was bananas in lots of ways, and cybersecurity was no exception. Whether critical infrastructure attacks or insecure databases, hacks, breaches, and leaks of unprecedented scale impacted …
A door-unlocking issue was discovered on Software House iStar Ultra devices through 6.5.2.20569 when used in conjunction with the IP-ACM …
When you are browsing a website, it is typical for that website to request data from another website on your behalf. For example, in most …
Arrested Hacker Konstantin Kozlovsky from Lurk Hacker group admits that he is one of the Author of WannaCry ransomware and the work was commissioned by intelligence agencies said in an interview to Dozhd TV channel. …
Singapore government has been opening up user data access to ease information exchange and business transactions, but it should observe some caution as major organisations continue to slip up over security. …
For years, the ex-NSA (National Security Agency) whistleblower Edward Snowden has been raising awareness about so-called secure messaging applications or programs and publically criticised apps like Skype, Google Allo, and Telegram. …
Magento Community Edition and Enterprise Edition before 2.0.10 and 2.1.x before 2.1.2 have XSS via e-mail templates that are mishandled …
Mozilla published an unexpected security patch this week, bumping Firefox up to version 57.0.3. (You probably weren’t expecting a browser …
custom/run.cgi in Webmin before 1.870 allows remote authenticated administrators to conduct XSS attacks via the description field in the …
Red Lion HMI panels allow remote attackers to cause a denial of service (software exception) via an HTTP POST request to a long URI that …
Many software companies offer bounties to anyone who can find glitches their code that could open the door to hacking. But often, it’s …
An innocent man was shot dead by a police officer after a Call of Duty gamer pranked authorities into giving fake addresses of a 28-year-old father. …
“Hey, send me that link!” You’ll hear that phrase everywhere and in every language around the …
We have always believed gaming consoles to be most well-protected devices but it is about time manufacturers like Sony take notice of …
Android developers will have to comply with two new requirements if they want their apps to be available on Google Play in the future. …
Think of a country that stifles internet freedom. You might first jump to the oppressive regimes of North Korea, China, or Cuba, where internet access is either forbidden or radically restricted. …
In Wireshark 2.2.11 and before, the MRDISC dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-mrdisc.c by …
In Wireshark 2.2.11 and before, the MRDISC dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-mrdisc.c by …
PHPJabbers File Sharing Script 1.0 has stored XSS in the comments …