Adobe, one of the most admired Tech firms today, released security updates patching up critical, important and moderate security holes in its Adobe Acrobat, Reader and Experience Manager products. Adobe Experience Manager (AEM) is an enterprise web content management system that facilitates organizing, managing, and delivering creative assets. Together, patches for 43 vulnerabilities were released […]

Read More →

Image Source: www.digitaltrends.com Apple released security updates this week, which affects macOS High Sierra, OS X El Capitan, iPhone, iPad, iPod, Apple TV and all Apple Watch models. These security updates addresses total of 17 vulnerabilities (CVE’s), Out of these 17 vulnerabilities 10 lead to arbitrary code execution. Along with security updates tech giant also […]

Read More →

Two new critical vulnerabilities have been discovered affecting every processor since 1995, which allow malicious programs to steal information from other programs memory. These vulnerabilities are named as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715). Meltdown and Spectre vulnerabilities affect all processors since 1995 including AMD, ARM, and Intel. These vulnerabilities allow an attacker to access […]

Read More →

Privilege escalation is the method of exploiting a bug, design flaw or configuration issues in an operating system or software application to gain access to resources that are restricted to be used by other users. An independent researcher Dawid Golunski exposed a privilege escalation vulnerability (CVE-2016-5616/CVE-2016-6663) present in MySQL, MariaDB and PerconaDB databases. This issue […]

Read More →

    Microsoft October 2016 Patch Tuesday brings 10 Security bulletins addressing 37 Vulnerabilities. Six bulletins are rated as Critical, three are rated as Important and one is rated as Moderate. Six Critical bulletins are, MS16-118 for Internet Explorer cover 11 CVE’s, MS16-119 for Microsoft Edge cover 13 CVE’s, MS16-120 for Microsoft Graphics cover 7 CVE’s, MS16-121 for […]

Read More →

A new vulnerability has been discovered by Ben Hayak, researcher at Trustwave, at Black Hat Europe in Amsterdam, that can gain access into your private cloud and steal information like private photos, video albums etc. just by clicking on a malicious link. This attack happens before the user realizes that something is going wrong. Yes, that means the application […]

Read More →