Category: Software
-
No More Ransom — 15 New Ransomware Decryption Tools Available for Free
If viable, these could be very valuable tools… Launched less than a year ago, the No More Ransom (NMR) project has increased its capacity with new partners and new decryption tools added to its now global campaign to combat Ransomware. Started as a joint initiative by Europol, the Dutch National Police, Intel Security and Kaspersky…
-
Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability
Again, how can this be good for Microsoft business? This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability…
-
Unpatched Python and Java Flaws Let Hackers Bypass Firewall Using FTP Injection
This newly discovered bugs in Java and Python is a big deal today. The two popular programming languages, Java and Python, contain similar security flaws that can be exploited to send unauthorized emails and bypass any firewall defenses. And since both the flaws remain unpatched, hackers can take advantage to design potential cyber attack operations…
-
Google Discloses Windows Vulnerability That Microsoft Fails To Patch, Again!
Could this be one of the reasons why Microsoft is no longer an industry leader? Microsoft is once again facing embarrassment for not patching a vulnerability on time. Yes, Google’s Project Zero team has once again publicly disclosed a vulnerability (with POC exploit) affecting Microsoft’s Windows operating systems ranging from Windows Vista Service Pack 2 to…
-
Microsoft Joins The Linux Foundation — Turns Love Affair Into a Relationship
You won’t believe your eyes while reading this, but this is true. Microsoft just joined the Linux Foundation as a high-paying Platinum member. Microsoft’s love with open source community is embracing as time passes. At its first Connect event in 2013, the company launched Visual Studio 2013. A year later, Microsoft open sourced .NET, and…
-
Adobe Flash Hacked in 4 Seconds, Safari Pwned In Less Than Half Minute
Most software vendors do not take security very seriously. This was a huge wake-up call to the world at large. PwnFest 2016 has become a death call for many software vendors. The hackers have managed to take down Apple’s Safari web browser in 20 seconds using a root privilege escalation zero-day. Another team managed to compromise Adobe…
-
Google discloses Critical Windows Zero-Day that makes all Windows Users Vulnerable
Users are advised to update their Flash software now and apply Windows patches as soon as they become available. Google has once again publicly disclosed a zero-day vulnerability in current versions of Windows operating system before Microsoft has a patch ready. Yes, the critical zero-day is unpatched and is being used by attackers in the…
-
Warning! Over 900 Million Android Phones Vulnerable to New ‘QuadRooter’ Attack
Download the free utility and see whether your phone needs patching. Verizon has patched only 1 of the 4 vulnerabilities. Shameful! Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide. What’s even worse: Most of those affected…
-
Microsoft: “Windows 10 Free Upgrade Offer Is Soon Coming To An End”
After the upcoming July 29, Windows 10 upgrade won’t be free anymore. As the free offer for Windows 7 and 8.1 users will expire, one will need to pay $119 for a fresh copy of Windows 10. Source: Microsoft: “Windows 10 Free Upgrade Offer Is Soon Coming To An End”
-
How Just Opening an MS Word Doc Can Hijack Every File On Your System | The Hacker News
If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised…