Archive

A critical vulnerability has been discovered in the Cisco Systems’ WebEx browser extension for Chrome and Firefox, that allows attackers to execute malicious code on the victims’ computer remotely. Cisco WebEx is a communication tool that allows users to connect

Finally, by the requests of many, Microsoft has provided a security feature that will be released with the Fall Creators Update. The requested feature known as Pin and Password recovery allows a user to recover his forgotten password directly from

Millions of Samsung products ranging from TVs, smartphones, and cameras are currently running Tizen OS, a Linux based operating system backed by both Samsung Electronics and Intel. A researcher has recently made the claim that Tizen may contain up to

Mass Domain Hijacking

More than 750 domain names were hijacked through the internet’s own systems, registrar Gandi has admitted. Late last week, an unknown individual managed to get hold of the company’s login to one of its technical providers, which then connects to

Two implementations of the Kerberos authentication protocol received patches this week against a vulnerability dubbed “Orpheus’ Lyre” that allowed a threat actor to bypass authentication procedures. Researchers tracked down the flaw to Kerberos versions released in 1996. The bug affects

Banking With a Selfie in Argentina ICBC, the largest bank in the world by asset volume, recently embraced facial recognition based security at its Argentinian subsidiary. The biometric security comes via FacePhi’s FIDO Certified mobile authentication platform, Selphi. ICBC customers

MacOS Malware on Rise

macOS users aren’t as safe as they think they might be—there’s a new strain of malware going around that infects devices, fakes bank websites, and steals credentials. It’s a dangerous strain of the OSX/Dok malware and it goes deep into

LeakerLocker, an Android ransomware that does not encrypt files but rather collects data from the android device such as pictures, messages and browser history and tends to share it with the persons contact if the ransom is not paid. The

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the top” content from the Internet, such as Netflix or Hulu, on their

One of the favourite pieces of software for malicious hackers to target on users’ computers is Adobe Flash Player. Why? Well, there are a few reasons. Firstly, Adobe Flash Player is on an awful lot of computers. Many users may

Computer security biz Preempt warned last October that Microsoft NT LAN Manager (NTLM) should be avoided. On Tuesday, it plans to support its assessment by going public with details of two vulnerabilities. NTLM is an old authentication protocol. Though it

Oracle’s next quarterly Critical Patch Update is slated for July 18, but two vulnerabilities in an older version of the company’s Oracle Access Manager (OAM) solution won’t be among the bugs patched. Version 10g of the software, Oracle’s solution for

Recorded Future’s Insikt Group threat intelligence has recently discovered a hacking software being distributed in underground forums for 500 dollars, the lightweight version for half the price, and rent is set at 200 dollars. Dubbed as Katyusha, the software lives

The Tuesday patch released by Microsoft recently addressed 19 critical vulnerabilities and 55 other flaws, the former being all related to remote code execution. Multiple products were affected by this patch including Internet Explorer 11, Office, Adobe Flash player, Edge,

The university of New Haven has developed what they call AGP (Artifact Genome Project), a database designed to revolutionize the way forensic data is analyzed and shared across the world between investigators. In short, it allows you to document how

According to the Global Cyber Security Index survey performed by the United Nations, only 50 percent of the countries either have a cyber security strategy, or are in the process of making one. A 134 countries were surveyed under the