Jump to content

Search the Community

Showing results for tags 'security flaw'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 8 results

  1. GitHub finally fixes 'high' severity security flaw reported by Google Project Zero Google's Project Zero team is dedicated to finding security vulnerabilities in the company's own software as well as those developed by other firms. Its methodology involves privately reporting flaws to vendors and giving them 90 days to fix them before public disclosure. Depending upon the severity of the situation, this deadline may be extended or brought closer according to the group's standard guidelines. At the start of November, Google publicly disclosed a "high" severity securi
  2. Ubuntu 20.04 could be hacked using this security flaw Trick your way to superuser privileges (Image credit: Shutterstock / Magura) security researcher claims to have accidentally discovered an "astonishingly straightforward way” to gain administrative powers on an Ubuntu 20.04 LTS installation. The vulnerability was unearthed by GitHub’s Kevin Backhouse who’s been spending time to weed out security vulnerabilities in Ubuntu’s system services to make his favourite distro as secure as possible. H
  3. Red Hat team provides mitigations, promises kernel updates. A cyber-security firm has gone public with details and proof-of-concept (PoC) code about a vulnerability in the Linux kernel that currently impacts only CentOS and Red Hat Enterprise Linux (RHEL) distributions. The vulnerability's name is Mutagen Astronomy and is tracked as CVE-2018-14634. Discovered by the team at the Qualys Research Labs, this security flaw is categorized as a Local Privilege Escalation (LPE) issue. This is a type of vulnerability that requires an attacker to have a foothold
  4. Researchers have reported their findings and fixes should be deployed by the end of 2019. A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards. Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.
  5. Thursday, 17 Oct 2019 | 1:15 PM MYT By Angelin Yeoh The Petrol Subsidy Programme microsite, which went live on Oct 15, is for users to find out if they are eligible for petrol subsidy, as announced in Budget 2020. The Domestic Trade and Consumer Affairs Ministry (KPDNHEP) has suspended the newly-launched Petrol Subsidy Programme microsite after a tech portal reported that it exposed users’ bank account details. KPDNHEP head of corporate communication, Yunus Tasim, said the ministry is aware and investigating the issue. "Once we got the news, we dec
  6. A Boeing code leak exposes security flaws deep in a 787’s guts Boeing's response to this glaring security lapse has not been reassuring. Enlarge / American Airlines Boeing 787-8 Dreamliner aircraft with registration N818AL landing at Athens International Airport. Nur Photo | Getty Images Late one night last September, security researcher Ruben Santamarta sat in his home office in Madrid and partook in some creative googling, searching for technical documents related to his years-long obsession: the cybersecurity of airplanes. He was surprised to disc
  7. Uber has no plans to fix a critical security flaw in its two-factor authentication (2FA) protocol reported by an IT security researcher. An Indian IT security researcher Karan Saini has discovered a critical security flaw in the two-factor authentication protocol used by the ride-hailing giant Uber to protect user accounts from hijacking and prevent their data from hackers. The flaw, on the other hand, allows attackers to bypass 2FA that could apparently lead them to perform a number of malicious acts including hacking a targeted account, change its username and passwor
  8. Security problems are usually discovered by geeks and people with a lot of time on their hands, but this is not always the case. In fact a flaw in the security of Xbox One was recently discovered by a five year old boy! While using his father's console,Kristoffer Von Hassel was able to log into his dad's account without having to enter the password used to protect it. The boy was understandably excited at the prospect of gaining unfettered access to the account: "I was, like, "yeah!" " he said. The hack was incredibly simple. After having been presented with the password screen and entering an
×
×
  • Create New...