Source: thehackernews.com Return of Coppersmith’s Attack, or ROCA for short is a cryptographic weakness in generation of RSA keys, that allows the private key of a key pair to be recovered from the public key. RSA is a public key cryptosystem widely used for secure data transmission. The vulnerability tracked as CVE-2017-15361, affects RSA key […]

Read More →

A major new security flaw has been discovered and it affects practically every device that uses Wi-Fi. Its called KRACK (Key Reinstallation Attacks), and its very easy for attackers to decrypt and spy on anything a victim do online, which includes any passwords that a victim types or any documents sent can be seen by […]

Read More →

Adobe has released four security updates for Adobe Flash Player (APSB17-23), Adobe Experience Manager (APSB17-26), Adobe Acrobat and Reader (APSB17-24) and Adobe Digital Editions (APSB17-27) which covers a total of 80 CVE’s. Adobe Flash Player address a critical type confusion vulnerability that could lead to code execution and an important security bypass vulnerability that could […]

Read More →

Microsoft June 2017 Patch Tuesday addressing 97 security vulnerabilities including fixing two critical vulnerabilities Windows Search Remote Code Execution (CVE-2017-8543) and LNK Remote Code Execution (CVE-2017-8464), are being actively exploited in the wild. The most dangerous vulnerability exists in Windows Search Service (WSS), a feature in Windows that allows users to search across multiple Windows […]

Read More →

    Microsoft October 2016 Patch Tuesday brings 10 Security bulletins addressing 37 Vulnerabilities. Six bulletins are rated as Critical, three are rated as Important and one is rated as Moderate. Six Critical bulletins are, MS16-118 for Internet Explorer cover 11 CVE’s, MS16-119 for Microsoft Edge cover 13 CVE’s, MS16-120 for Microsoft Graphics cover 7 CVE’s, MS16-121 for […]

Read More →

A critical vulnerability is discovered in Rivest Cipher 4 software stream cipher. In cryptography, RC4 is one of the most used software-based stream ciphers in the world. The cipher is included in popular Internet protocols such as Transport Layer Security (TLS). It is a very simple cipher when compared to competing algorithms of the same […]

Read More →