security hole
-
Google revealed a critical flaw in Qualcomm's Adreno GPU
the google project zero team has publicly revealed a security hole that exists in the adreno gpu integrated on the snapdragon chip. -
Discovered a particularly dangerous vulnerability in Cisco Jabber video conferencing software
if the vulnerability in cisco jabber is exploited successfully, the hacker will gain control of the victim's computer. -
Google Chrome has a serious zero-day error, and hackers can execute malicious code at its fullest
this vulnerability allows hackers to bypass the content security policy (csp) rules that were released in chrome 73. luckily, google has a patch for this vulnerability now. -
Detect a critical flaw in VMware Cloud Director, which could pave the way for hackers to take control of enterprise servers
the newly discovered vulnerability in vmware's cloud director platform has the ability to allow attackers to access sensitive information and even control private clouds throughout the infrastructure. -
Detecting a Thunderbolt flaw allows a hacker to steal system data for 5 minutes
recently, international security researcher bjorn ruytenberg unexpectedly discovered a vulnerability called 'thunderspy' that exists in thunderbolt ports, allowing hackers to easily steal data. -
Microsoft releases important OOB security updates for Microsoft Office
microsoft has urgently released an out-of-band security update for the purpose of fixing remote code execution vulnerabilities that exist in the autodesk fbx library. -
Detecting Qualcomm CPU errors can cause private data on the phone to leak
security researchers have revealed a series of dangerous vulnerabilities that allow attackers to steal important personal information of smartphone owners running qualcomm cpus. -
Serve a serious flaw in Avast Desktop Antivirus Windows application
detect serious xss vulnerabilities that appear in avast desktop antivirus application. -
The macOS Mail app has security holes related to the Siri virtual assistant application
the snippets.db file in the database stores information from mail and other applications that are storing unencrypted email content. -
Hackers can bypass the Face ID face with just a pair of black adhesive tape
according to experts, this method can fool face id by making this security tool think users are opening their eyes. -
Your computer can be hacked after opening a document in LibreOffice
if you are using or intending to use libreoffice, you should be very careful about open files with this software in the near future. -
Face some new hacking techniques related to Bluetooth technology
hackers can easily take advantage of the vulnerabilities available in the bluetooth protocol to deploy various infringing activities.