Vulnerability Archive

Critical Android phones Vulnerability

Security researcher Joshua J. Drake (@jduck) discovered one of the worst Android vulnerabilities discovered to date. This android critical vulnerability targets 95% of Android devices, almost 1 billion devices. Every Android phone or tablet with a version between 2.2 and 5.1 of the android operating system is

Critical Magento security patch for July 2015

Magento just releasted a new security patch and they recommend us to install it immediately. As part of our ongoing commitment to security, we have uncovered potential vulnerabilities that we are proactively addressing today with a new patch (SUPEE-6285). There are no confirmed reports of attacks related

Ensure your Magento software security is up-to-date before security risk is publicized

Magento sent an email today to all accounts registered on it’s official website regarding a security update. If you’re using Magento Community Edition you are exposed to remote code execution. So please read the message below and go to Magento’s Official Website and download a security patch

Safari users have the right now to sue Google

  Google may now be on trial by Safari users after losing a Court of Appeal bid. Now, Safari users from UK have the right to sue  over alleged misuse of privacy settings. Users claim that Google avoided the security settings on the Safari browser by installing tracking cookies

How to know if you have been hacked

81% of large businesses have suffered malicious data breaches shows in a cybersecurity survey, made by UK Government’s in 2014. That indicate almost one in five didn’t. “In this context, it’s impractical to prove a negative,” said Lenny Zeltser, a senior faculty member at the SANS Institute, who

Break the internet

The big question is could the internet ever be switched off? We think the internet is unbreakable. At least, until now it is not proved. Perhaps a more accurate term would be “hijacking the Internet”. London’s Docklands district is a big building in which is a substantial node in

Can driverless cars be hacked ?

  Driverless cars could be vulnerable to hackers who could bring cities to a chaos, steal cars remotely or even commit deadly terror attacks, and many other problems, is a known fact. The report from the Institution of Engineering and Technology (IET) suggests that autonomous vehicles could be on the roads in

Tracking the FREAK ATACK, a huge SSL security flaw

  Called Freak, Factoring attack on RSA-EXPORT Keys, the security breach exists on high-profile websites. It is supossed that seven hours is all it takes to crack the encryption that is in place on some supposedly secure websites. Browsers can be hijacked and tricked into accessing websites using legacy encryption.  There was

Uber database breach exposed 50000 drivers

Uber released a statement on Friday announcing that it suffered a data breach in 2014 that affected 50 000 Uber drivers across the United States. The Uber’s database was accessed by an unauthorized third party. Uber says that 50 000 driver partner names and driver’s license numbers

How to get $12500 from Facebook

Two days ago I posted an article about a Facebook vulnerability that allows deleting any photo. The person who discovered the vulnerability said on it’s personal blog that Facebook payed him $12500 for reporting this vulnerability. If you want to read about the vulnerability that Laxman Muthiyah