Hackers bypassed Galaxy S10 ultrasonic biometric fingerprint scanner

There are security vulnerabilities in the Samsung Galaxy S10 ultrasonic biometric fingerprint scanner, and hackers can use the 3D printed fingerprint of the mobile phone user to pass the verification. The Samsung S10 and S10+ use ultrasonic fingerprinting technology, which is safer than traditional fingerprint scanning technology. Samsung has claimed that even Read more…

 5,709 total views,  250 views today

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in Read more…

 1,961 total views,  190 views today

About Blueborne !

The latest Bluetooth vulnerability With the number of smart, connected devices on the rise, so are concerns about online privacy and security, especially with the spate of ransomware and other malware attacks dominating the headlines over the past year. Even as the world is trying to recover from the WannaCry Read more…

 374 total views,  33 views today

Microsoft Windows SMB Server Remote Code Execution Vulnerability ( CVE-2017-1178 )

Windows SMB Server Remote Code Execution Vulnerability ( CVE-2017-1178 ) October 10, 2017, Microsoft released the latest patch, one of the serious vulnerability patch release, the vulnerability for Microsoft’s Windows operating system SMB protocol remote code execution vulnerability, CVE number CVE-2017-11780. The vulnerability level is high. A number of system versions that Read more…

 90 total views,  12 views today

All the Terms Of Hacking

Common Terms Of Hacking World 1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack. 2# VPS: It stands for Virtual private server Read more…

 106 total views,  12 views today

Critical Vulnerability In Skype

CyberSecurity Researcher Found Stack Buffer Overflow Vulnerability In Microsoft Skype Software Vulnerability Lab Security researcher Benjamin Kunj Mejri discovered a Stack Buffer Overflow Vulnerability in the official Microsoft Skype v7.2, v7.3.5.103 & v7.3.6 software. Technical Details & Description: A remote and local stack buffer overflow vulnerability has been discovered in Read more…

 294 total views,  12 views today

KSN Report: Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware Read more…

 116 total views,  12 views today

A new mode used by Hackers for phishing

  PhishLabs security researchers have found a new way of phishing that allows hackers to use the phone-side URL address bar to lead the user into the phishing site. At present, this means has a lot of users in the mobile side of Facebook users have in the move. Researchers revealed that the new attack strategy Read more…

 56 total views,  6 views today