Keeping up its promise, Google has issued security patch addressing the Heartbleed security vulnerability for its Compute Engine. Last week, the company promised to patch affected services like Cloud SQL, Google Compute…
Tag: Vulnerability
NSA secretly exploited Heartbleed claims new report, but agency denies
The National Security Agency (NSA) was well aware of the Heartbleed flaw and has been regularly exploiting it to gather critical intelligence for at least two years, anonymous sources familiar with the…
Heartbleed coder: Mistake was ‘trivial’ but effect is ‘clearly severe’
Heartbleed bug, the worst security flaw the internet has ever encountered, was introduced to the world on New Year’s Eve 2011. The man behind the so-called coding error has come forward, confessing…
Google Chrome bug discovered – compromises microphone privacy
Guy Aharonovsky, an Israel based developer, has exposed the threats posed by a Google Chrome bug, which makes users’ microphones vulnerable to hacking. As reported by Aharonovsky, the bug lets any website…
Heartbleed bug turns into web’s security disaster
‘Heartbleed’ bug, the so-called security flaw in crucial encryption code, has made headlines this week as the most significant and dangerous vulnerability to ever hit the internet. According to security researchers, this…
Windows XP, Office 2003 set to receive final security updates in next Patch Tuesday
Microsoft is going to roll out the final security patches for the soon-to-retire Windows XP and Office 2003 in its upcoming Patch Tuesday on April 8. Microsoft will be releasing 4 security…
Apple patches Safari security holes
Apple has patched a total of 27 vulnerabilities in Safari 6 and Safari 7 which were exploited successfully during the recent Pwn2Own hacking contest earning security researchers rewards in tune of $65,000….
WinRAR file spoofing vulnerability revealed
A vulnerability exists in WinRAR – probably one of the most used file archiving and data compression applications for Windows platform – that allows attackers to spoof files within the compressed archive…
Philips Smart TVs vulnerable to screen hijack, browser cookie theft, more
Update We have received the following statement through email from the Wi-Fi Alliance: “Wi-Fi Alliance takes security very seriously. All of our specifications and certifications include requirements to support the latest generation…
Microsoft rushes out ‘Fix it’ for actively exploited Word zero-day vulnerability
Microsoft warned users about a zero-day vulnerability in all the versions of Microsoft Word that is being actively exploited in targeted attacks, involving Rich Text Format file and Microsoft Outlook email client….
Vulnerability exposes Google account login email addresses
A security researcher stumbled upon a vulnerability while poking around Google services using which any user can find out the personal email address of the victim even if they have not shared…
Cisco patches critical vulnerabilities in small business routers, WLAN controllers
Cisco has patched critical vulnerabilities in a range of its small business routers and WLAN controllers including, which if exploited can not only cause denial-of-service conditions, but could also compromise the confidentiality,…
CERT-In warns of critical VPN flaw in Android Jelly Bean, KitKat versions
Computer Emergency Response Team of India (CERT-In) has issued an advisory numbered CIAD-2014-0012 pertaining to a critical VPN flaw in Android 4.3 Jelly Bean and Android 4.4 KitKat revealing that the vulnerability…
Hard-coded root password found in Synology DiskStation Manager VPN module
Synology DiskStation Manager has a critical vulnerability wherein VPN module has a hard-coded password for root, which attackers can use to connect to Synology device and possibly other devices on the shared…
iOS 7 vulnerability allows for background monitoring on non-jailbroken iDevices
Security researchers have found a vulnerability in latest version of iOS 7 which could allow attackers to record users’ touch / tap events on non-jailbroken iDevices including iPhone 5S. Researchers have created…