Google has issued a new security update for its Chrome 49 that patches a number of flaws, most of them discovered by external researchers. Google has updated Chrome 49 for all the available versions in order to patch several critical vulnerabilities, including the flaw discovered thanks its bounty program that were rewarded with dozen thousands of […]
A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentage of Android devices in use today is affected by security vulnerabilities that could be exploited by attackers to easily gain a root access. The attack allows an ill-intentioned […]
The Portuguese cyber security expert David Sopas has discovered a Reflected File Download (RFD) vulnerability affecting Google Finance. The researchers explained that different from other similar Reflected File Download he discovered in the past, this time, the attackers don’t need to create a page to force the download. “Found this vulnerability when auditing other client. With this RFD you don’t […]
The FBI raided another the second home in Chicago to arrest the second alleged culprit in the Fappening hack Investigation. In 2014 an unknown hacker leaked online nude pictures of celebrities, including the popular and Kate Upton. We are speaking about the case known as The Fappening, the hacker took over a large number of Apple iCloud accounts, […]
Google confirms that the next Android versions will use Oracle’s open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android. The company is planning to adopt as an alternative an open source solution. What is this OpenJDK? It is an […]
Findings of a research show that the Nest camera is still operating even after it has been disabled through the mobile application. People buy security cameras to have a higher level of control over their lives, but recently a research by a team at ABI Research found that users also must be worried about the […]
A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender email name. The independent security researcher Yan Zhu has discovered a serious security issue in the Gmail Android app allows ill-intentioned to send an email pretending to be someone else. Clearly a similar loophole could represent a […]
Google listens and records our voice searches, but the majority of the users ignores it. I’ll explain how to listen and delete them from your account. Google knows everything of our digital existence and the story that I’m going to tell you confirm it. The fact that Google keeps track of our researchers is not […]
A billion Android phones are vulnerable to Stagefright 2.0 flaws that could be exploited by attackers to execute malicious code on the targeted device. Do you remember the Stagefright vulnerability? In July 2015, security experts from Zimperium discovered the Stagefright flaw in the popular Google Android OS which allows hackers to gain control of the system without raising […]
The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control server with multiple advantages for attackers. Establish a backdoor is one of the main goals for an attacker in order to gain persistence over the targeted machines. There are many hacking tools that allow easily to […]