Home

25 May 2018

Over the past 9 years, Google Chrome has become one of the best and most popular web browsers in the world. The major reason for its swift rise has been Google’s focus on security. Currently, protecting Chrome users from malware is the topmost priority. Chrome can protect you from ransomware, hijackers and other unpleasant extends…

25 May 2018

Apple is going to allow all of its users to download their data which the company have collected about them so far. On Wednesday, Apple launched a new Data and Privacy website that permits you to download every details which the company knows about you, including the user’s Apple ID info, device info, App Store…

24 May 2018

The Cisco security team have unearthed more than 500,000 routers and storage devices in numerous countries that have been infected with a piece of highly sophisticated IoT botnet malware. According to the findings these are likely the work of some state-sponsored group. Talos, the cyber intelligence unit of Cisco have found an advanced piece of…

24 May 2018

The security researchers from a Chinese firm Tencent have found more than a dozen vulnerabilities in the compute units of BMW cars. A few of these vulnerabilities can be exploited to endanger a vehicle. These faults have been discovered after a year long security audit of their cybersecurity research unit, Keen Security Lab. The same…

17 May 2018

The first network-based remote Rowhammer attack, known as Throwhammer, involves exploiting a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels. Now a group of researchers have revealed a second network-based remote Rowhammer technique which can attack systems using uncached memory or flush instruction while processing the network requests. It…

11 May 2018

Just after the revelation of the two critical vulnerabilities in GPON router, at least 5 botnet families are found exploiting the flaws to build an army of million devices. Security researchers from Chinese-based cybersecurity firm Qihoo 360 Netlab have found 5 botnet families, including Mettle, Muhstik, Mirai, Hajime, and Satori, using the GPON exploit. Gigabit-capable…

10 May 2018

Users who have recently installed the security updates on Windows 10 workstations are finding that they have received an error when trying to establish a remote desktop connection to a server which had worked properly before installing the updates. The initial March 13, 2018, release updates the CredSSP authentication protocol and the Remote Desktop clients…

10 May 2018

The Internet Society and the African Union Commission has disclosed a new set of Guidelines that emphasizes the importance of privacy protection and accountable usage of personal data for creating greater trust online and for the development of the digital economy in Africa. These guidelines were revealed at the Africa Internet Summit held at Dakar,…

09 May 2018

Yahoo has quietly launched a new iOS and Android messaging app called Squirrel. This app is currently an invite only group messaging app that is focused on friends, family and work groups who wishes to send messages and share photos, links and other media. The access to any group is through invitation only by inviting…

08 May 2018

Microsoft Patch Tuesday has released security patches for two zero-days vulnerability among the total 67 vulnerabilities and two publicly disclosed bugs. The zero-day patches have been actively exploited by cybercriminals. Microsoft is confronting 21 vulnerabilities which are considered as critical, 42 as important, and 4 as low severity. The security patch updates deal with security flaws…