Google Pixel hacked in under 60 seconds by Chinese team
The recently launched Google Pixel phone has been hacked by the Chinese hackers just in less than a minute! A team called White-Hat hackers from Qihoo 360, which participated inRead More →
The recently launched Google Pixel phone has been hacked by the Chinese hackers just in less than a minute! A team called White-Hat hackers from Qihoo 360, which participated inRead More →
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on the target server. If you can execute python,Read More →
Earlier this month, we discovered a piece of encryption malware targeting Russian users. One of its peculiarities was that it uses Telegram Messenger’s communication protocol to send a decryption keyRead More →
Third-party applications that allow single sign-on via Facebook and Google and support the OAuth 2.0 protocol, are exposed to account hijacking. Three Chinese University of Hong Kong researchers presented atRead More →
Short Bytes: Infecting people’s computers with the help of malicious USB drives is an old trick being used by hackers even today. Going one step ahead, in the recent months, weRead More →
The following proof of concept video demonstrates the techniques Cylance researchers used to compromise a Sequoia AVC Edge Mk1 voting machine. The video shows how easy it is for aRead More →
A bug in the iOS WebView component allows an attacker to force someone’s iPhone to dial any number, while also locking the user’s interface for a few moments, preventing himRead More →
D-Link DIR model router’s Home Network Administration Protocol (HNAP) service contains a stack-based buffer overflow that has not been patched by the manufacturer. The flaw, listed under CVE-2016-6563, and spottedRead More →
Malicious ads exploited zero-day flaw in Android that auto downloaded files. Google has shut down an operation that combined malicious AdSense advertisements with a zero-day attack exploiting Chrome for AndroidRead More →
Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL injection. Belkin’s WeMo home automation firmware that’s in use inRead More →