Search Results for: buffer overflows Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”... Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Blog Post What is a Denial of Service (DoS) Attack? March 3, 2020 A Denial of Service (DoS) attack is a method used to disrupt legitimate users’ access to a target network or... Blog Post WhatsApp Flaw Allows Attackers to Install Spyware May 17, 2019 WhatsApp, a popular instant messenger application, patched a serious security vulnerability this week, after discovering it early this month. The... Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Blog Post Adobe Fixed Arbitrary Code Execution Issues in February February 14, 2020 Adobe has released more than 40 security fixes to address major software vulnerabilities during this month’s patch update. According to... Blog Post The Scariest Cybersecurity Issues In Last 10 Months November 14, 2019 It is November now, and it means it has been 10 months since 2019 starts. In the past 10 months,... Blog Post 2016 Windows Mitigations February 1, 2017 In 2016, Microsoft took several steps to improve and increase security for modern Windows versions in small steps, called mitigations.... Blog Post Simple but Critical NetUSB Flaw Leaves Millions of Home Routers Open to Attack May 20, 2015 An amazingly simple flaw called NetUSB has potentially endangered millions of home routers around the world, leaving them vulnerable to attacks. Blog Post New Bug Leaves Over a Billion Android Vulnerable (And Unpatchable) November 20, 2014 A vulnerability affecting over a billion Android devices was disclosed recently under the name CVE-2014-7911. The vulnerability was discovered by... Blog Post Making Users Hack Themselves – Reflected Cross Site Scripting Combines Social and Technical Attack Vectors January 18, 2015 Most of you know the dangers of cross-site scripting (XSS), but how many of you know that Reflected XSS combined with a bit of social engineering can be even more dangerous?
Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features...
Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”...
Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Blog Post What is a Denial of Service (DoS) Attack? March 3, 2020 A Denial of Service (DoS) attack is a method used to disrupt legitimate users’ access to a target network or...
Blog Post WhatsApp Flaw Allows Attackers to Install Spyware May 17, 2019 WhatsApp, a popular instant messenger application, patched a serious security vulnerability this week, after discovering it early this month. The...
Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Blog Post Adobe Fixed Arbitrary Code Execution Issues in February February 14, 2020 Adobe has released more than 40 security fixes to address major software vulnerabilities during this month’s patch update. According to...
Blog Post The Scariest Cybersecurity Issues In Last 10 Months November 14, 2019 It is November now, and it means it has been 10 months since 2019 starts. In the past 10 months,...
Blog Post 2016 Windows Mitigations February 1, 2017 In 2016, Microsoft took several steps to improve and increase security for modern Windows versions in small steps, called mitigations....
Blog Post Simple but Critical NetUSB Flaw Leaves Millions of Home Routers Open to Attack May 20, 2015 An amazingly simple flaw called NetUSB has potentially endangered millions of home routers around the world, leaving them vulnerable to attacks.
Blog Post New Bug Leaves Over a Billion Android Vulnerable (And Unpatchable) November 20, 2014 A vulnerability affecting over a billion Android devices was disclosed recently under the name CVE-2014-7911. The vulnerability was discovered by...
Blog Post Making Users Hack Themselves – Reflected Cross Site Scripting Combines Social and Technical Attack Vectors January 18, 2015 Most of you know the dangers of cross-site scripting (XSS), but how many of you know that Reflected XSS combined with a bit of social engineering can be even more dangerous?