Cyber Security hacking news LibreOffice Linux security Linux Software Office software Security Vulnerability Windows Security windows software

Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again

If you are using LibreOffice, you need to update it once again. LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities. LibreOffice is one of the most popular and open source alternatives to Microsoft Office […]

ATM skimming Card Skimming Credit Card Fraud credit card hacking Credit Card Skimmers Cybersecurity hacking news Security

Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas Pumps

In recent years, gas stations have become one of the favorite targets for thieves who are stealing customers’ credit and debit card information by installing a Bluetooth-enabled payment card skimmers at gas stations across the nation. The media has also reported several recent crimes surrounding credit card skimmers, including: Gas pump skimmer found at a […]

bluetooth hack Bluetooth hacking bluetooth vulnerability hacking bluetooth devices hacking news Security Vulnerability

New Bluetooth Vulnerability Lets Attackers Spy On Encrypted Connections

Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices. The vulnerability, assigned as CVE-2019-9506, resides in the way ‘encryption key negotiation protocol’ lets two Bluetooth BR/EDR devices choose […]

google Google Project Zero hacking news hacking windows password Microsoft Security Vulnerability windows Vulnerability Windows zero-day vulnerability

Google Discloses 20-Year-Old Unpatched Flaw Affecting All Versions of Windows

Update — With this month’s patch Tuesday updates, Microsoft has finally addressed this vulnerability, tracked as CVE-2019-1162, by correcting how the Windows operating system handles calls to Advanced Local Procedure Call (ALPC). A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows […]

advertisement retargeting antivirus software browser cookies cookies stealing Internet Security Kaspersky Kaspersky Antivirus Privacy Security super cookies tracking cookies

Kaspersky Antivirus Flaw Exposed Users to Cross-Site Tracking Online

In this digital era, the success of almost every marketing, advertising, and analytics company drives through tracking users across the Internet to identify them and learn their interests to provide targeted ads. Most of these solutions rely on 3rd-party cookies, a cookie set on a domain other than the one you are browsing, which allows […]

Android Banking Malware android banking trojan banking malware banking Trojan Cerberus Malware Cybersecurity hacking news Malware mobile spying apps Security

Cerberus: A New Android ‘Banking Malware For Rent’ Emerges

After a few popular Android Trojans like Anubis, Red Alert 2.0, GM bot, and Exobot, quit their malware-as-a-service businesses, a new player has emerged on the Internet with similar capabilities to fill the gap, offering Android bot rental service to the masses. Dubbed “Cerberus,” the new remote access Trojan allows remote attackers to take total control over the infected […]

denial of service denial-of-service attacks dos attack HTTP 2.0 Protocol HTTP Strict Transport Security HTTP2 Protocol HTTPS encryption Security server vulnerability

8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

Various implementations of HTTP/2, the latest version of the HTTP network protocol, have been found vulnerable to multiple security vulnerabilities affecting the most popular web server software, including Apache, Microsoft’s IIS, and NGINX. Launched in May 2015, HTTP/2 has been designed for better security and improved online experience by speeding up page loads. Today, over hundreds of […]

BlueKeep RDP Flaw BlueKeep RDP Vulnerability RDP Vulnerability Remote Desktop Protocol Remote Desktop Services Security Vulnerability windows hacking

4 New BlueKeep-like ‘Wormable’ Windows Remote Desktop Flaws Discovered

If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the recently patched ‘BlueKeep‘ RDP vulnerability. Discovered by Microsoft’s security team itself, all four […]

AppTrana Cybersecurity Security vulnerability scanner Web Application Firewall Web Application Security Web Application Security Scanner Web Application Vulnerability website vulnerability

Let Experts Do Their Job – Managed WAF by Indusface

WAF (Web Application Firewall) has been the first line of defence when it comes to application security for a while now. Many organizations have adopted WAF in one form or the other and most cases, compliance has been the driver for adoption. But unfortunately, when it comes to the efficacy of WAF in thwarting attacks, […]

epic games epic games fortnite fortnite game Fortnite Game Download Fortnite hacks Fortnite v-bucks hack gaming server hacked fortnite accounts hacked gaming accounts hacking game Security

Epic Games Hit With Class Action Lawsuit Over Hacked ‘Fortnite’ Accounts

Epic Games, the creator of the popular ‘Fortnite’ video game, is facing a class-action lawsuit from gamers over hacked Fortnite accounts, accusing the company of failing to maintain adequate security measures and notify users of the security breach in a timely manner. The lawsuit, filed by ‘Franklin D. Azar and Associates’ in the United States […]