Vulnerabilities 2014Three High severity vulnerabilities of the last week

Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger.

1. Execution of arbitrary code in Avast Antivirus

Danger: Critical
The number of vulnerabilities: 1
Vector of operation: Remote
Impact: System Compromise

Affected Product: Avast Antivirus
Vulnerable version: Avast Antivirus 2015.10.3.2223, possibly earlier versions Read the rest of this entry »

WinGuard Pro
WinGuard Pro – application that allows you to lock some of the features of your system, as well as the implementation and installation of programs to limit the use of your PC, secures your computer by password protecting your Windows applications, programs and locking EXE files.

With this program you can password protect your programs, windows and web pages in one easy to use program. Read the rest of this entry »

Android SecurityNew Android Critical Vulnerabilities

1. CVE-2015-1538 Exploit for Android is Now Available for Testing Purposes

This exploit has several caveats. First, it is not a generic exploit. Zimperium Team only tested it to work on a single device model. Zimperium Team tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in heap layout, this is not a 100% reliable exploit by itself.

Zimperium Team were able achieve 100% reliability when delivered through an attack vector that allowed multiple attempts. Finally, this vulnerability was one of several that was neutered by GCC 5.0’s ‘new[]’ integer overflow mitigation present on Android 5.0 and later. Read the rest of this entry »

Chinese Great FirewallAn introduction to the Great Firewall (GFW)

It is interesting to know that the Chines government has blocked many of the popular websites like, Facebook, Google, and the YouTube through the filtering system called Great Firewall (GFW).

There is still one way to bypass the security system, the VPN services. Read the rest of this entry »

Torrent VPN ProvidersThe best VPN service is one that has the backing of many users from different geological location with the different devices and planes.

Remember, the most expensive VPN service don’t always mean the most reliable and fast.

The competitive environment allows the user to select the best VPN service even in cheap price. Read the rest of this entry »

Windows 10 securityAre Microsoft actually taking security seriously this time around?

Windows has had plenty of problems with hackers because it was (and still is) the most popular operating system on the planet–but times have changed. Windows is still viciously popular, and is still the most commonly used operating system for desktop devices, but hackers have different priorities these days.

As a hacker, why bother trying to break into the ever updating Windows system to gain access to a company’s systems when their employees will click a hacker’s links in Twitter? Why hack a Windows computer to get financial information, when hackers can crack your PayPal or Skrill passwords and wire themselves as much money as they like? The answers to people’s secret questions for their bank accounts can be found by the information they have added to Facebook, and people will happily download unchecked and free apps to their phones. Read the rest of this entry »

Adios, Hola

Researchers warn: Free VPN Hola vulnerable to hacking

Around 52 million users are using Hola free VPN service (Free VPN, Secure Browsing, Unrestricted Access) in and around the world. The free service has made the hackers to constantly track the activity of any user. It has security issues and it has to be looked upon as it has higher chances of serious consequences. It is best advised by the security researchers to instantly call a farewell to the Hola VPN service.

The Hola VPN works in such a way that it provides a distinct marker that is specific to a single user. The identifier seems to be the same even after rebooting the system. Hola allows you to get tracked across the Internet. Read the rest of this entry »

New security vulnerabilities 2015Several new security vulnerabilities of varying severity has been found by security researchers

Several new security vulnerabilities of varying severity has been found by security researchers:

  • System compromise in Android (high severity vulnerability)
  • Bypassing security restrictions on Apache Tomcat (middle severity vulnerability)
  • Multiple vulnerabilities in CMS Drupal (low severity vulnerability)
  • Compromising the system in Apple QuickTime for Windows (high severity vulnerability) Read the rest of this entry »

Internet Explorer vulnerabilitiesMicrosoft has corrected zero-day vulnerability in Internet Explorer

The flaw allows an attacker to gain complete control over the target device.

Microsoft has released an update that corrects zero-day vulnerability in Internet Explorer of versions 7-11 (this flaw does not appear to be present in new Microsoft Edge). The Critical Hole CVE-2015-2502 allows an attacker to remotely execute code on the target device.

According to Microsoft, the remote user can use a specially created a web-site to compromise a vulnerable system. The vulnerability is caused due to a memory corruption error when handling certain objects. Read the rest of this entry »

Hacking Team hackedHacking news 2015: The Hacking Team Hacking – Latest news

Recall, July 5, unknown hackers have broken into the computer network of the company and abducted more than 400 GB of corporate data.

Stolen information includes corporate documents, source code, and even, as it became known, a few exploits for zero-day vulnerability in Adobe Flash. Also, hackers managed to hack the official Hacking Team account in Twitter.

Hacking Team’s CEO David Vincenzetti issued a new statement promising that the company plans to deliver the recovered version of Galileo Remote Control System (Galileo, is the advanced and sophisticated spyware tool) and internal infrastructure to replace products that have been compromised in the cyber attacks. Read the rest of this entry »