Android Malware Infects Router Via DNS Hijacking

Security researchers have disclosed a new Android Malware, It uses victims’ devices to infect WiFi routers and funnel any users of the network to malicious sites. The malware doesn’t target users directly – instead its goal is to facilitate further attacks by turning victims into accomplices. Security Researchers at Kaspersky Lab, who discovered the malware and dubbed… Read More »

Critical Flaw Reported on PHPMailer – Remote Code Execution

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application. Millions of PHP websites and popular open source web applications, including WordPress, Drupal, 1CRM, SugarCRM, Yii,… Read More »

Hackers Demonstration for SQL Injection – In-Flight Entertainment System Can Hacked

Hackers demonstrate SQL injection vulnerability in a in-flight entertainment system. It is being used by the leading airlines, including Emirates, United, American Airlines, Virgin, and Qatar, could let hackers hijack several flight systems and even take control of the plane. Security researchers explained in IOActive, the security vulnerabilities resides in the Panasonic Avionics In-Flight Entertainment (IFE) system used… Read More »

Critical Security Flaws Reported in Cisco WebEx Meetings Server

Security researchers have reported some critical security flaws in WebEx Meeting Server. Using one security flaw (CVE-2016-1482), An attacker can exploit it to execute arbitrary commands with elevated privileges by injecting the commands into existing application scripts running on a targeted device located in a DMZ (demilitarized) zone. Using second security flaw (CVE-2016-1483), An unauthenticated attacker to… Read More »

Samsung Pay Token Flaw Allows Hackers to do Fraud Transactions??

Security researcher has discovered several security issues in the Samsung Pay mobile payment service, It includes a vulnerability in Samsung Pay mobile service that can be exploited to make fraudulent transactions. Samsung Pay service provide users a digital wallet where they can keep their plastic credit, debit, gift, loyalty and membership cards. When customers want… Read More »

Malware Attack : Pokemon Go fake Android App Automatically Clicks on Porn Ads

Cybercriminals are making target to mobile users using a new malware. They have created a new fake application for Pokemon Go. It is a Android lock screen malware, posing as a fake app for the popular mobile game, has been uncovered. According to IT security company ESET The application lures victims into installing it onto their… Read More »

Ubuntu’s Forums Hacked, Over 2 Million User Credentials Leaked

Popular Derbian-based Linux operating system (OS) Ubuntu’s user forums have been hacked with over two million user details leaked online.  It includes Usernames, Email addresses, IP addresses. Ubuntu is one of the the most popular Linux distribution systems used for PCs, smartphones and network servers. . According to Canonical Ltd which makes the OS says There has been… Read More »

Data Breach on Datadog Servers, Asked to Change Passwords

The software-as-a-service monitoring and analytics platform company Datadog has faced a massive attack on their servers. Due to this attack, Hackers breached their servers and a user credential database. Datadog has high profile clients including Facebook, Spotify, Citrix and others has strongly suggested that customers initiate password resets in efforts to err on the side… Read More »

New Backdoor Allows Full Access to Mac Systems – Bitdefender Security

Security researchers team from Bitdefender has discovered a new critical malware affecting Mac OS X machines that grants attackers full remote access to the computer, as well as stealing data and hijacking the user’s webcam. They have published a detailed report for the explanation, how it works with apple systems. Researchers team from Bitdefender reported Backdoor.MAC.Eleanor within a malicious… Read More »

Secret Voice Commands in YouTube Videos Could Hijack Your Smartphone

Security researchers disclosed a critical security flaw in Youtube Videos, by using this critical flaw hackers can take control of your smartphone using its built-in voice recognition software. By burying mangled voice commands within YouTube videos, a team of university professors in the US found that they could instruct a nearby device to carry out potentially harmful… Read More »