0
Remote Code Execution Vulnerability in Adobe Flash Player Remote Code Execution Vulnerability in Adobe Flash Player

A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a double-free condition whe...

Read more »

0
EC-Council Hacked 2014 EC-Council Hacked 2014

The security company EC-Council which provides multiple certificates like the Certified Ethical Hacker has been hacked by a hacker th...

Read more »

0
Top 10 Open Source security tools Top 10 Open Source security tools

The layered-security approach centers on maintaining appropriate security measures and procedures at five different levels within your I...

Read more »

0
How to detect a hacker attack How to detect a hacker attack

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit , several exploit...

Read more »

0
Ubuntu 13.10 Kernel Exploit Ubuntu 13.10 Kernel Exploit

A security issue affects Ubuntu 13.10 releases of Ubuntu and its derivatives Saran Neti reported a flaw in the ipv6 UDP Fragmentation ...

Read more »

0
Google is monitoring Wikipedia Google is monitoring Wikipedia

Thomas Steiner, a Customer Solutions Engineer at Google Germany GmbH, Hamburg has created an application that shows in a very clear ...

Read more »

0
Millions of Vulnerable Android Devices Exposed Millions of Vulnerable Android Devices Exposed

Android devices prior to version 4.2.1 of the operating system—70 percent of the phones and tablets in circulation—have been vulnerable ...

Read more »
 
 
Top