web analytics
  • News and Threat Analysis,  Tools, Tricks and More

    ATTACKERS CAN HIJACK YOUR IPHONE SILENTLY WITH THIS VULNERABILITY. MORE DANGEROUS THAN YOU THINK!

    Completing its benchmark of 1 billion sales across the globe, Apple devices are always among on top of the best devices that are known to provide the ultimate privacy and keep its users up to date about security-related issues. These devices are sometimes also called hack-proof because either they are very difficult to hack or they require extensive knowledge of hardware underlying its devices to explore the bug and exploit it. From the last decade, be it any industry of entertainment across the globe, the scenario of hacking is shown as a hot cream (with 3-4 consoles running simultaneously and a person is hacking or taking the control of the…

  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    FLAWS IN MOBILEIRON’S MDM SOFTWARES ALLOW RESEARCHERS TO HIJACK FACEBOOK’S SERVER

    According to recent attacks on an enterprise we have explored till now, the study shows that the causes are the common vulnerabilities which administrators give least importance. There is no doubt on the fact that these common vulnerabilities are one of the creamy things that every hacker tries to find in a system but these vulnerabilities are not the only thing that can leave a system exposed. In today’s time, every sector are somewhat dependent on third party softwares to expand their vision and functionalities. But with growing functionalities, the security of a system becomes more vulnerable as then the system has more vectors to attack. For example, every web…

  • News and Threat Analysis,  Tools, Tricks and More

    VULNERABILITY IN VISA CONTACTLESS CARD TRANSACTIONS COULD ALLOW HACKERS MAKE MILLIONS WITHOUT ANY ACTION

    In last 6 months, COVID-19 has make all of us to believe on the fact that no surface is absolutely safe to touch. As a result, people had to adopt new normal in order to survive and earn living. Welcoming this new normal, we all have learnt to abide on two most important rules which are: Social distancing. Conduct contactless meetings as much as possible. Therefore, anyone who has still not adopted the new normal is considered to be of no use by the society. If we talk about new normal in context to payments and transactions, obviously cashless or plastic payments have become the priority over cash payments. From…

  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    CAN MACROS STILL COMPRISE THE APPLE’S SECURITY SILENTLY? IS IT STILL A ZERO DAY?

    In today’s time programmers are so much addicted to automation that they find new ways to automate tasks. The simple reason behind this is whether we are a programmer or a normal human, we find it lame and time consuming to do the same task again and again. Even scripting languages like Python, Javascript made it easier to do complex tasks with a couple of lines of codes. As we are moving forward, the efficiency of writing the code is getting optimized day by day with new languages getting introduced to us. Logic remain same, programmers just need to adapt the syntax. The automation is not just restricted to program…

  • News and Threat Analysis,  Tools, Tricks and More

    CITRIX WORKSPACE VULNERABILTIY ALLOWS REMOTE HACKING OF DEVICES

    It is a new trend that has been adopted by many corporates and organization in this outbreak is the Work from home strategy. There is no doubt that this strategy has resulted in generating quite a lot of profit for the corporates as they don’t have to feed their employees by hiring a physical workspace,spending on their transport, electricity bills, etc. They just need to ask employees to work more. It’s a tradition that every profit too has it’s own consequences. If a employer is working from home, all the work is done remotely. As the work is done remotely, security concerns takes place as now the organization’s intranet is…