Dubbed "XcodeGhost" in Chinese apps software renders App store Vulnerable!

Dubbed "XcodeGhost" in Chinese apps software renders App store Vulnerable! Recently a shocking revelation about the prese...

ENTERPRISE DATA AT RISK : IOS SANDBOX VULNERABLE

ENTERPRISE DATA AT RISK : IOS SANDBOX VULNERABLE  A risk has been reported in the devices as well as the MDM solutions after the...

Hacking PayPal Account with Just a Click

Hacking PayPal Account with Just a Click The eBay owned popular digital payment and money transfer service, PayPal has been found to be...

Yahoo fixes Critical Remote Command Execution vulnerability

Yahoo fixes Critical Remote Command Execution vulnerability Cyber Security Expert and Penetration tester, Ebrahim Hegazy has found...

Microsoft's Office blog hacked by Syrian Electronic Army

S yrian E lectronic Army kept their promise, Microsoft's Office blog hacked Microsoft has faced another targeted attack by the ...

Facebook Hacker received $33,500 reward

Facebook Hacker received $33,500 reward for Remote code execution vulnerability Facebook has paid out its largest Bug Bounty ever o...

iPhone iOS 7.0.2 Sim Lock Screen Bypass vulnerability

iPhone iOS 7.0.2 Sim Lock Screen Bypass vulnerability If you're unlucky enough to lose your Smartphone or have it stolen, anyone w...

Password disclosure vulnerability in Barracuda Networks | Server Misconfiguration

Server Mis-configuration discloses passwords of all Barracuda Networks Employees Security expert Ebrahim Hegazy has found a Passwor...

Network Enabled Samsung TVs vulnerable to Denial of Service Attack

Network Enabled Samsung TVs vulnerable to Denial of Service Attack Download Exploit A vulnerability in the latest firmware ...

Telecom Italia Cookie Handling vulnerability allows hackers to hijack email accounts

Telecom Italia Cookie Handling vulnerability allows hackers to hijack email accounts A cookie is a piece of data that is issued by a s...

TrueCaller hacked and Database leaked

TrueCaller hacked and Database leaked TrueCaller, a popular app built by a Swedish company and world's largest collaborative phon...

Chinese Hackers discovered second Android master key vulnerability

Chinese Hackers discovered second Android master key vulnerability Android Security Squad, the China-based group that uncovered a ...

The biggest bank robbery in history, Hackers stole $45 million

The biggest bank robbery in history, Hackers stole $45 million They didn't use guns, masks or even threatening notes passed to ba...

HDFC Bank website vulnerable to ID Theft and Account Blockade

HDFC Bank website vulnerable to ID Theft and Account Blockade Indian Security Researcher Jiten Jain today revealed that one of the ...

iPhone Instagram users vulnerable to hackers

iPhone Instagram users vulnerable to hackers  Instagram - Facebook’s popular photo sharing app for iOS, is currently has a vulnerabi...

TCS Information Disclosure Vulnerability

TCS Information Disclosure Vulnerability India  India's leading  software services and consulting  company TCS ( Tata Consulta...

Adobe confirmed database Hack

Adobe officially confirmed database Hack Screenshot of Adobe's Hacked website " connectusers.com "  Yesterday HackRepo...

6 Million Virgin Mobile users vulnerable to Hackers

6 Million Virgin Mobile users vulnerable to Hackers Virgin Mobile customers beware: Your phone number is the key to your personal i...

Oracle Database stealth password cracking vulnerability

Oracle Database stealth password cracking vulnerability Oracle suffered with serious vulnerability in the authentication protocol ...

Critical vulnerability in Photoshop CS6

Critical buffer overflow vulnerability in Photoshop CS6 Adobe has released an update for Photoshop CS6 that closes a critical heap-ba...

index