Apple Released Security Updates for iOS, Safari, macOS , tvOS, watchOS

Apple released security updates for products and fixed several vulnerabilities with the new release of iOS 12.4, tvOS 12.4, Safari 12.1.2, macOS Mojave 10.14.6, watchOS 5.3. iOS 12.4 released with the several...

On the IoT road: perks, benefits and security of moving smartly

Kaspersky has repeatedly investigated security issues related to IoT technologies (for instance, here, or here). Earlier this year our experts have even gained foothold in the security of biomechanical prosthetic...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the...

File Copy Vulnerability With ProFTPD puts Over 1 Million Servers at Risk

File copy vulnerability in ProFTPD server allows an anonymous remote attacker to execute the code in vulnerable machine results in remote code execution and information disclosure without authentication. By exploiting the...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Chrome’s Incognito Lopehole Let Sites to Detect People’s Browsing Activity

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities. Incognito Mode...

Hack Instagram – How Instagram was Hacked within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of your Instagram account within 10 minutes. Facebook and Instagram are frequently...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Chrome’s Incognito Lopehole Let Sites to Detect People’s Browsing Activity

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities. Incognito Mode...

LATEST NEWS

MUST READ