Vulnerabilities

DHS Warnings for Critical Flaws in Medical Equipment

The Department of Homeland Security (DHS) warns that critical vulnerabilities affecting Medtronic Valleylab products that permit attackers to overwrite files and to execute remote software. A Cybersecurity & Infrastructure Security Agency (CISA) DHS advisory warns about three recently patched vulnerabilities that could enable attackers to install a non-root shell in Medtronic Valleylab FT10 and FX8…

Which Antivirus is Safe and Useful for Android Phones?

Dependence on Android devices is on the rise worldwide. Millions of users are invariable in country and scale and store hundreds of essential personal and business information on mobile devices. The protection of information from getting into the wrong hands is increasingly concerned. Most of us can not, while on holiday, leave our mobile phones…

Facebook Discloses Security Infringement for Teams API Bug

Facebook said that about 100 developers of primarily video streaming and social media management software could have exposed data to private group members such as name and profile pictures. This happened following Facebook restricting or deleting various developer APIs, including the Group APIs, which gave the app devs extended group information access for longer than…

The Best Android Hacking Software and Tools

Most people want to use their Android phone as a hacking tool. Many people know how and what tool to install, but many others know little about the Android hacking apps or the Android tools. We have tried to compile the 30 best Android computer hacking apps that we have today-Android hacking apps and devices…

Office 365 to Stop Windows Infection Malicious Files

A new feature called an Application Guard is available to Microsoft Office 365 ProPlus, which allows users to open attachments in a virtualized container that will prevent Windows from malicious macro and exploits. Microsoft Edge for Windows 10 includes the Windows Defender Application Guard feature that lets you start your browser tab in a special…

ProtonMail Source Code iOS App Made Public

This week Proton Technologies, the Swiss company behind ProtonMail, the privacy-based email service, revealed it has released the source code of itsiOS client software. ProtonMail iOS has been recently audited by SEC Consult, a cyber-security consultant who documents seven low-risk vulnerabilities, including issues relating to hard-coded passwords, missing certificate pinning, bypass methods of account updating,…

Quick Guide to Fixing ‘ ERR-SSL-PROTOCOL-ERROR ‘ Chrome

Almost everybody who is on Google Chrome must have received at least one error message from the’ ERR SSL PROTOCOL ERROR’ or “This site can’t connect securely.” Okay, why does this error message appear? The truth is that there is no discernible reason; it appears at any given time on any website. In reality, there…

Ransomware Decryptor Paradise Gets your Files Back for Free

Emsisoft has released a Paradise Ransomware decryptor that allows victims to decrypt their files free of charge. The Paradise Ransomware has encrypted victims for over two years and users could not get their files back if they did not recover or pay for the ransom. Original Paradise Ransomware variant Today, Emsisoft has released a decryption…

Service Denial DDoS Attack Use Kali Linux

What is Distributed Service Attack Denial(DDoS)? A distributed DDoS attack aims to make a device or network asset inaccessible to their intended users. Although its means and motives vary, it usually involves efforts to interrupt a host connected to the Internet temporarily or indefinitely. This article discusses how a Denial-of-Service attack can be carried out…

Silicon-Based Service Protection System Micron Launches

The new Security Solution based on hardware helps Silicon-level Secure IoT devices I can certainly be identified in two categories: small embedded things (like sensors in the industrial control environment) for low capacity and more powerful edge devices (such as routers, smart TVs, in-car entertainment systems etc.). According to Gartner, 30 billion IoT devices will…