A group of security analysts has found a few vulnerabilities in different executions of OpenPGP and S/MIME email signature check that could enable attackers to spoof signatures on over a dozen of prominent email customers.
The influenced email customers include Thunderbird, Microsoft Outlook, Apple Mail with GPGTools, iOS Mail, GpgOL, KMai
Cyber criminals are using used mobile numbers
and trying to gain access to personal information of victims including their
bank account details, social media account, internet banking and many other
personal and sensitive details. A simple trick is used by hackers to wreak
havoc in your life.
What is actually happening
Due to the some polici
to 50,000 organizations running SAP software are at more serious danger of
being hacked after security researchers found better approaches to exploits
vulnerabilities of frameworks that haven't been properly protected and
published the tools to do so online. German software giant SAP said it issued
direction on the most proficient method to acc
It is found that recently launched Dell-made
Windows laptops have a chance that the system is vulnerable to a remote hijack.
A 17-year-old security researcher has found that
a program pre-installed in these laptops hosts a vulnerability that can be
exploited remotely to breach your security.
The researcher, analyzed 'SupportAssist' progr
A critical deserialization remote code execution
vulnerability in Oracle WebLogic Server is found that could allow attackers to
remotely run arbitrary commands on the affected servers just by sending a
specially crafted HTTP request—without requiring any authorization. This vulnerability (CVE-2019-2725), which affected all versions of the Oracle
Researchers from Chinese cyber security
firm Qihoo 360's NetLab have uncovered details of a progressing credit card
hacking effort that is as of now stealing payment card data of clients visiting
in excess of 105 internet business sites.
While checking a malicious domain,
www.magento-analytics[.]com, for over most recent seven months, rese
India’s leading and well known company, Wipro,
was attacked by the security breach earlier this month as the company
Employees’ were subjected to very advanced phishing activity. The attackers
used a remote access tool, Powerkatz, and Powersploit in the campaign.
The ScreenConnect is a remote access tool that is
used to provide desktop supp
type of an advanced phishing attack on Android Chrome let hackers conceal the
Orignal address bar' screen space by showing its own fake URL bar when the user
scrolls down the web page.
researcher James fisher showed this phishing assault by hosting his own domain
(jameshfisher.com), and he abuses the defect in ch
There are some free applications available on google play and app store
which provide free calls over internet to users. Anyone having a mobile phone
can download this application for free and make free calls.
An application called "Call India - IntCall" provides the
same service, and this application is available on google play as well as app
enterprise software company Citrix that provides services to the U.S. military,
the FBI, many U.S. corporations, and various U.S. government agencies finally
confirms that the cybercriminals successfully compromised their internal
network and accessed the most sensitive files also they removed from their
network during the security breach