Last week Apple have released a big frameworks as part of World Wide Developers Conference 2017 to take the iPhone and iPad users to next era of cyber space.The framework is called Augmented reality[ARKit]. A developer can make use of
ROOT SHELL ATTACK Possible on Motorola G4 & G5
Researchers had found out that several Motorola handset models especially there G4 7 g5 are vulnerable to a critical kernel command line injection flaw that could allow a local malicious application to execute arbitrary code on the devices. Their CVE Report :
GOOGLE PLAYSTORE Found its First Rooting-Trojan with code injection capability
A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store. What’s interesting? The app was smart enough to fool Google
MS PowerPoint Hack Spreads MALWARE
A new variant of a malware called “Zusy” has been found in the wild spreading as a PowerPoint file attached to spam emails with titles like “Purchase Order #130527” and “Confirmation”. It’s interesting because it doesn’t require the user to
40000 Subdomains Shut Down
Tens of thousands of illegally established subdomains used by criminals involved with the RIG Exploit Kit were recently taken down after an investigation revealed that hackers were phishing domain account credentials to set up these subdomains. Most of the subdomains
EternalBlue Exploit spreading GHOST RAT & Nitol
EternalBlue, the exploit used in the WannaCry ransomware outbreak, is now being leveraged to distribute the Nitol backdoor and Gh0st RAT malware. Security researchers at FireEye said, just as WannaCry criminals did, threat actors are leveraging the same Microsoft Server Message
CIA tools hack windows silently over the network
WikiLeaks had published details of a purported CIA operation that turns Windows file servers into covert attack machines that surreptitiously infect computers of interest inside a targeted network. “Pandemic,” as the implant is codenamed, turns file servers into a secret
Vulnerability in Sudo Command — affects all Linux distros
A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system.This vulnerability affecting the manner in which Sudo parsed tty information could have resulted in