Archive for the ‘Vulnerability’ Category

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

February 22nd, 2019
A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world. According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying

Posted in Bigscreen VR, Cross site scripting, hacking news, VR apps, vr experience, vr headset, Vulnerability | Comments (0)

Another Critical Flaw in Drupal Discovered — Update Your Site ASAP!

February 21st, 2019
Developers of Drupal—a popular open-source content management system software that powers millions of websites—have released the latest version of their software to patch a critical vulnerability that could allow remote attackers to hack your site. The update came two days after the Drupal security team released an advance security notification of the upcoming patches, giving websites

Posted in Drupal, Drupal exploit, drupal hacked, Drupal hacking, Hacking Drupal website, hacking news, remote code execution, Vulnerability | Comments (0)

Warning: Critical WinRAR Flaw Affects All Versions Released In Last 19 Years

February 21st, 2019
Beware Windows users... a new dangerous remote code execution vulnerability has been discovered in the WinRAR software, affecting hundreds of millions of users worldwide. Cybersecurity researchers at Check Point have disclosed technical details of a critical vulnerability in WinRAR—a popular Windows file compression application with 500 million users worldwide—that affects all versions of the

Posted in hacking news, Hacking Windows, path traversal attack, remote code execution, Vulnerability, Windows Malware, WinRar, winrar exploit | Comments (0)

Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 Years

February 19th, 2019
Exclusive — If you have not updated your website to the latest WordPress version 5.0.3, it’s a brilliant idea to upgrade the content management software of your site now. From now, I mean immediately. Cybersecurity researchers at RIPS Technologies GmbH today shared their latest research with The Hacker News, revealing the existence of a critical remote code execution vulnerability that

Posted in hack wordpress, hacking news, remote code execution, Vulnerability, WordPress, Wordpress hacking, Wordpress Security | Comments (0)

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

February 13th, 2019
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious program to obtain root privileges and total control over the targeted system. Dubbed "Dirty_Sock" and identified as CVE-2019-7304, the vulnerability was discovered by security researcher Chris Moberly, who privately disclosed it to Canonical, the

Posted in hacking news, linux, privilege escalation, Snap Package, Ubuntu, Ubuntu Linux, Vulnerability | Comments (0)

Latest iOS 12.1.4 Update Patches 2 Zero-Day and FaceTime Bugs

February 8th, 2019
Apple has finally released iOS 12.1.4 software update to patch the terrible Group FaceTime privacy bug that could have allowed an Apple user to call you via the FaceTime video chat service and hear or see you before you even pick up the call without your knowledge. The Facetime bug (CVE-2019-6223) was discovered by 14-year-old Grant Thompson of Catalina Foothills High School while he was

Posted in Apple Face Time, Apple iPhone, Google Project Zero, Group FaceTime, iphone update, macOS update, privilege escalation, Vulnerability | Comments (0)

Android Phones Can Get Hacked Just by Looking at a PNG Image

February 6th, 2019
Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps. Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of

Posted in cyber security, hack android mobile, hacking android phone, how to hack android, mobile exploit, mobile vulnerability, PNG Image Hack, remote code execution, Vulnerability | Comments (0)

Critical Zcash Bug Could Have Allowed ‘Infinite Counterfeit’ Cryptocurrency

February 6th, 2019
The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that could have allowed an attacker to coin an infinite number of Zcash (ZEC). Yes, infinite… like a never-ending source of money. Launched in October 2016, Zcash is a privacy-oriented cryptocurrency that claims to be more anonymous

Posted in cryptocurrency, cryptocurrency exchange, cyber security, make money, Vulnerability, zcash, zcash miner | Comments (0)

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

February 5th, 2019
You've always been warned not to share remote access to your computer with any untrusted people for many reasons—it's basic cyber security advice, and common sense, right? But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers? Security researchers at cybersecurity firm Check Point have discovered more than two dozen

Posted in hacking news, RDP exploit, RDP server hacking, remote code execution, Vulnerability, windows hacking | Comments (0)