HOW TO INTERCEPT SATELLITE COMMUNICATIONS EASILY?
In today world we use satellite communication in many respects and industries and we all know how important they are in our lives. There different kinds of satellites depending uponRead More →
In today world we use satellite communication in many respects and industries and we all know how important they are in our lives. There different kinds of satellites depending uponRead More →
Two kernel vulnerabilities were left unpatched on older devices running Android Jelly Bean and KitKat. QuarksLAB, a security research company based in Paris, France, has stumbled upon two kernel vulnerabilities inRead More →
After a few critical bugs were recently discovered and patched in the core WordPress engine—a rarity with WordPress-related security issues—order has apparently been restored with the discovery of a criticalRead More →
Apple just released iOS 9.0.2. This new version claims to close the well-publicised Lock screen hole that lets anyone view and edit your contacts, send text messages, and rummage throughRead More →
Ex-Googler Sanmay Ved was lucky enough to grab Google.com domain, but only for a minute. In a detailed post on LinkedIn, the former Google employee said he was learning more aboutRead More →
When researcher Joshua Drake published details in August about critical Android vulnerabilities in the Stagefright media playback engine, he promised there would be more issues that he and others wouldRead More →
Gatekeeper is Mac OS X’s guardian against rogue applications and malware sneaking into Apple’s famous walled garden. It’s also been a favorite target of researchers and advanced attackers desperate toRead More →
Vulnerability allowed hackers to hijack active user sessions.Microsoft Exchange Server has been recently patched to fix an important security vulnerability which would have allowed attackers to gain access to activeRead More →
SAP patched a dozen holes in its in-memory management system, HANA, that could have led to SQL injection attacks, cross-site scripting (XSS) errors, and memory corruption vulnerabilities. Many of theRead More →
WinRAR, the popular file compression and decompression utility, has a security vulnerability that allows attackers to remotely execute code on the user’s computer when opening an SFX (Self-extracting archive) file.Read More →