Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media.
LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to stream multimedia over open
Posted in cyber security, live streaming, media player, VLC media player, Vulnerability | Comments (0)
Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users' accounts.
The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email
Posted in Blogging, Bug Bounty Program, bug report, Cyber Attack, hacking news, Tumblr, Tumblr hacked, Vulnerability, Web Application Security | Comments (0)
A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password.
The security vulnerability, tracked as CVE-2018-10933, is an authentication-bypass issue that was introduced in
Posted in hacking Linux servers, hacking news, libssh, linux security, OpenSSH, secure shell, ssh exploit, ssh hacking, ssh security, Vulnerability | Comments (0)
What if just receiving a video call on WhatsApp could hack your smartphone?
This sounds filmy, but Google Project Zero security researcher Natalie Silvanovich found a critical vulnerability in WhatsApp messenger that could have allowed hackers to remotely take full control of your WhatsApp just by video calling you over the messaging app.
The vulnerability is a memory heap overflow issue
Posted in hack whatsapp account, hack whatsapp chat, hacking news, how to hack whatsapp, remote code execution, Vulnerability, Whatsapp, WhatsApp video calling, Whatsapp vulnerability, Whatsapp web | Comments (0)
A known vulnerability in MikroTik routers is potentially far more dangerous than previously thought.
A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year.
The vulnerability, identified as CVE-2018-14847, was initially rated
Posted in hacking router, hacking wireless router, how to hack router, MikroTik Router, MikroTik Vulnerability, Router hacking, router vulnerability, Vulnerability, wifi hacking, zero-day exploit | Comments (0)
Researcher identifies a weakness in the software layer – and reminds us that we’re placing a lot of trust in vendors to implement decent security in formerly passive devices
Posted in solar power, Vulnerability | Comments (0)
If you use Foxit’s PDF reader, make sure you update – and stick with Safe Reading mode until you do
Posted in Foxit Reader, malicious PDF, Vulnerability | Comments (0)
If there’s one thing we’ve learned, it’s that any new way of DDoSing will reveal that there are a huge number of undefended devices online
Posted in DDoS, DDoS-for-hire, Security threats, Vulnerability | Comments (0)