If you’re here to hear about the top 10 ranking of the OWASP IoT-good. Since IoT devices are everywhere over us, they leave private data and confidential information vulnerable to…
Vulnerabilities
Have you recently, along with Avast Safebrowser, installed Avast Antivirus and find it unwanted? If so, you’re not the only one. There are several individuals who deem the browser Avast…
After reports that they can be remotely locked by hackers, the manufacturer of a ‘smart’ male chastity gadget has proposed using a screwdriver to break them free. The Chinese firm…
Ransomware is a sophisticated form of file-encrypting malware that attacks the victim’s data and locks it. The attacker then demands that the victim pays a ransom ranging from hundreds to…
Google published Chrome 83 this week to the stable channel with patches for a total of 38 bugs, enhanced Safe Browsing support, and revised security and privacy controls. The newly…
Researchers have discovered that a weakness associated with pairing in Bluetooth Basic Rate / Enhanced Data Rate (BR / EDR) connections could be exploited to impersonate a previously paired unit….
Security researchers working with the Zero Day Initiative (ZDI) of Trend Micro have released information on five unpatched vulnerabilities in Microsoft Windows, including four that were considered high risk. The…
Firebase is a 2011 product of both mobile and web applications by Firebase, Inc. It was later purchased by Google in 2014. The Firebase provides various server analytics, authentication, databases,…
A vulnerability is any aspect of a design , architecture or configuration of a device that allows cyber criminals to conduct attacks, manipulate services, and steal data. There are various…
Nowadays BYOD onboarding activities are being followed by staff, consumers and stakeholders at all levels. Luckily, businesses are completely able to limit access to the network before customers are accepted….