Serious Root Access Bug in Belkin N750 Router
A serious vulnerability in a popular Belkin router could be exploited by a local, unauthenticated attacker to gain full control over affected devices. The good news is that the bugLEER MÁS
Noticias de Vulnerabilidades | Blog de Vulnerabilidades | Tutoriales
A serious vulnerability in a popular Belkin router could be exploited by a local, unauthenticated attacker to gain full control over affected devices. The good news is that the bugLEER MÁS
Google introduced a new security tool to help developers detect bugs and security glitches in the network traffic security that may leave passwords and other sensitive information open to snooping.LEER MÁS
Mozilla Firefox and Thunderbird are prone to a remote memory-corruption vulnerability. Successfully exploiting this issue will allow an attacker to obtain sensitive information. Failed exploit attempts will likely result inLEER MÁS
The BlackEnergy malware is crimeware turned APT tool and is used in significant geopolitical operations lightly documented over the past year. An even more interesting part of the BlackEnergy storyLEER MÁS
A white-hat hacker from Sweden says he’s found a serious security hole in Apple’s Yosemite OS X that could allow an attacker to take control of your computer. Emil Kvarnhammar,LEER MÁS
The Find My Mobile service on Samsung phones is designed to let users lock their devices if they’re lost or stolen, protecting any personal information stored on the handset. ButLEER MÁS
The FBI is trying its best to convince an ambiguous regulatory body in Washington to modify its operation rules with the aim of possessing new powers to hack into andLEER MÁS
If you didn’t patch your site quickly, you should assume it was compromised, Drupal says. Users of the Drupal content management system platform got a rude awakening this week: AccordingLEER MÁS
The Value of a Name I woke up to a text on Saturday morning that was only about twenty minutes old: “Google Account password changed.” Shit. It had happened. ForLEER MÁS
Many of you must have recently heard about the Android Master Key vulnerability, which allows a malicious payload to be inserted in an application that is installed, due to aLEER MÁS