Ninety-nine percent of fresh malware programs attack Android: Report

As per findings of the Kaspersky Security Bulletin 2012, ninety-nine percent of newly discovered mobile malicious programs target the Android platform, while only a very small amount targets Java and Symbian-based smartphones. The report found that 2012 was the second year to show explosive growth in Android malware. From a negligible eight new unique malicious … Continue reading

Apps on your phone could be stealing your data

How many apps do you have? On an average, on any given smartphone or tablet you will be sure to find at least six to seven apps, and it wouldn’t be a surprise if you were to find even more than twenty apps. Whether it’s a smartphone you are using or a tablet, your experience … Continue reading

nCircle patches PureCloud vulnerability scanner on Vulnerability-Lab report

  The Vulnerability-Laboratory Research Team discovered persistent and client side POST Injection web vulnerability in thenCircle PureCloud (cloud-based) Vulnerability Scanner Application. The vulnerability allows an attacker to inject own malicious script code in the vulnerable module on application side. Benjamin K.M. from Vulnerability-Laboratory provide more technical details about these flaws, the first vulnerability is located in the Scan Now > Scan Type … Continue reading

cPanel and WHM Multiple Cross Site Scripting Vulnerabilities

cPanel and WHM Multiple Cross Site Scripting Vulnerabilities cPanel is a Unix based fully featured popular web based hosting account control panel that helps webmasters to manage their domains through a web browser. The latest version of cPanel & WHM is 11.34, which is vulnerable to multiple cross site scripting. During my bug hunting process, today I (Christy Philip Mathew) discovered some serious … Continue reading

Android malware to rise in 2013, predicts ESET

Android malware to rise in 2013, predicts ESET In its latest study, ESET points out that viruses and worms spreading through flash drives along with rise in malware targeting Android OS are the main trends of malware landscape in India in 2013. In its official statement, ESET adds that as per its last year’s report, … Continue reading

Yahoo data leak by Virus_Hima, Why do we need a proactive security?

Yahoo data leak by Virus_Hima, Why do we need a proactive security? AUTHOR : PIERLUIGI PAGANINI In November I was contacted for first time by the Egyptian Hacker named ViruS_HimA who announced me to have hacked into Adobe servers and leaked private data. The hacker violated Adobe servers gaining full access and dumping the entire database with … Continue reading

Security weakness in Android App SSL Implementations

Security weakness in Android App SSL Implementations   The most common approach to protect data during communication on the Android platform is to use the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Thousands of applications in the Google Play market that are using these implementations. A group of researchers including Sascha Fahl, Marian … Continue reading

Samsung Smart TV Contain a Vulnerability Which Allows Remote Attackers to Swipe Data.

ReVuln Ltd. , a small security company headed by Donato Ferrante and Luigi Auriemma, post a video that demonstrates that how attacks can gain root on the appliances.   Samsung Smart TV contain a vulnerability which allows remote attackers to swipe data from attached storage devices. In this demonstration readers will see how it is possible … Continue reading

  • Calender

    June 2017
    M T W T F S S
    « Mar    
     1234
    567891011
    12131415161718
    19202122232425
    2627282930  
  • Blog Stats

    • 10,621 hits
  • Upcoming Events

    No upcoming events