We all know the fact that hackers can get access to personal data by hacking computer, smartphone or tablet. Ang Cui and Jatin Kataria from Red Balloon Security concluded that monitor is also not as safe as it seems at first sight. “Do not trust the pixels on the screen”, said they and demonstrated how […]
Search Results
Your Computer Monitor could be hacked to get access to your system
Posted: August 20, 2016 in Vulnerability NewsTags: new type of attack
[Cyber Security] Web surfing academy: staying on the safe side
Posted: April 12, 2016 in ArticlesTags: cyber security
Web surfing academy: staying on the safe side Internet is teeming with malware, viruses, and fraudulent schemes that pretty easily hook careless users. In this article we are focusing on the essential aspects of safe browsing – it’s a must-read for web surfing pioneers and a nice refresher for seasoned internet users.
Droid in danger: Most alarming security threats for Android users
Posted: February 24, 2016 in ArticlesTags: Android security
Cell-phone, especially smart-phone, has become a vital part of our lives and we can’t seem to even start our day without it. The digital era that we live in today demands us to stay on the go and hence smart-phones have become an essential extension of our ‘self’. Where the worldwide sales and usage of […]
What Kind of Personal Security Software is Right for You?
Posted: December 29, 2015 in ArticlesTags: Anti-Malware, antivirus, firewall
Security software should work well with your operating system, and it shouldn’t get in the way of your daily activities. Most browser hijackers aim to send you messages about shopping opportunities, which results in a slower computing experience. The same is true for poorly made security solutions.
Various security tools for safer browser access
Posted: November 23, 2015 in ArticlesTags: cyber security, security tools
Well, who doesn’t loves to access free software for their download purposes? Everyone surely wants to access these opportunities as and when available. Recently, there was an unscientific poll organized in the country where it was asked to multiple readers to acknowledge about their most wanted free information security accessing tools. And here are few […]
Cybersecurity threats 2015: a security update that fixed five vulnerabilities in Joomla!
Posted: October 24, 2015 in Vulnerability NewsTags: Content Management System, High severity vulnerabilities, Joomla
Five vulnerabilities in the content management system Joomla! These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights. The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of […]
Cybersecurity threats 2015: Three High severity vulnerabilities of the last week
Posted: October 6, 2015 in Vulnerability NewsTags: High severity vulnerabilities, Remote Code Execution, vtiger, WinRAR
Three High severity vulnerabilities of the last week Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger. 1. Execution of arbitrary code in Avast Antivirus Danger: Critical The number of vulnerabilities: 1 Vector of […]
[Android Security 2015] New Android vulnerabilities
Posted: September 11, 2015 in IT Security NewsTags: Android malware, Android Trojan, Android vulnerabilities
New Android Critical Vulnerabilities 1. CVE-2015-1538 Exploit for Android is Now Available for Testing Purposes This exploit has several caveats. First, it is not a generic exploit. Zimperium Team only tested it to work on a single device model. Zimperium Team tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in […]
Are Microsoft taking security seriously with Windows 10?
Posted: August 28, 2015 in ArticlesTags: Microsoft, Secure Boot, Virtual Secure Mode, Web Browser, Windows 10
Are Microsoft actually taking security seriously this time around? Windows has had plenty of problems with hackers because it was (and still is) the most popular operating system on the planet–but times have changed. Windows is still viciously popular, and is still the most commonly used operating system for desktop devices, but hackers have different […]
Cybersecurity threats 2015: new security vulnerabilities has been found by security researchers
Posted: August 22, 2015 in VulnerabilitiesTags: Android, Android vulnerabilities, Apache Tomcat, Apple QuickTime, Apple QuickTime vulnerabilities, Cybersecurity threats 2015, Drupal, Drupal vulnerabilities
Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]