Jump to content

Search the Community

Showing results for tags 'security flaw'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 10 results

  1. Peloton security flaw let attackers grab sensitive user data The vulnerability has since been fixed, but it took time. Ezra Shaw/Getty Images Even your exercise equipment isn't immune to security issues. TechCrunch reports that Pen Test Partners' Jan Masters discovered a Peloton security flaw that let attackers grab sensitive data, including user info (such as age and weight), location and workout stats. The researcher found that you could make unauthenticated requests to Peloton's programming interface to get someone's data, whether or not they'd set t
  2. AirDrop Security Flaw Exposes 1.5 Billion Apple Devices, Researchers Say Photo: Victoria Song/Gizmodo Apple’s AirDrop feature is a convenient way to share files between the company’s devices, but security researchers from Technische Universitat Darmstadt in Germany are warning that you might be sharing way more than just a file. According to the researchers, it’s possible for strangers to discover the phone number and email of any nearby AirDrop user. All a bad actor needs is a device with wifi and to be physically close by. They can then simply open u
  3. Cisco Warns of Critical Auth-Bypass Security Flaw Cisco also stomped out a critical security flaw affecting its Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches. A critical vulnerability in Cisco Systems’ intersite policy manager software could allow a remote attacker to bypass authentication. The vulnerability is one of three critical flaws fixed by Cisco on this week. It exists in Cisco’s ACI Multi-Site Orchestrator (ACI MSO) — this is Cisco’s management software for businesses, which allows them to monitor the
  4. GitHub finally fixes 'high' severity security flaw reported by Google Project Zero Google's Project Zero team is dedicated to finding security vulnerabilities in the company's own software as well as those developed by other firms. Its methodology involves privately reporting flaws to vendors and giving them 90 days to fix them before public disclosure. Depending upon the severity of the situation, this deadline may be extended or brought closer according to the group's standard guidelines. At the start of November, Google publicly disclosed a "high" severity securi
  5. Ubuntu 20.04 could be hacked using this security flaw Trick your way to superuser privileges (Image credit: Shutterstock / Magura) security researcher claims to have accidentally discovered an "astonishingly straightforward way” to gain administrative powers on an Ubuntu 20.04 LTS installation. The vulnerability was unearthed by GitHub’s Kevin Backhouse who’s been spending time to weed out security vulnerabilities in Ubuntu’s system services to make his favourite distro as secure as possible. H
  6. A Boeing code leak exposes security flaws deep in a 787’s guts Boeing's response to this glaring security lapse has not been reassuring. Enlarge / American Airlines Boeing 787-8 Dreamliner aircraft with registration N818AL landing at Athens International Airport. Nur Photo | Getty Images Late one night last September, security researcher Ruben Santamarta sat in his home office in Madrid and partook in some creative googling, searching for technical documents related to his years-long obsession: the cybersecurity of airplanes. He was surprised to disc
  7. Researchers have reported their findings and fixes should be deployed by the end of 2019. A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards. Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.
  8. Thursday, 17 Oct 2019 | 1:15 PM MYT By Angelin Yeoh The Petrol Subsidy Programme microsite, which went live on Oct 15, is for users to find out if they are eligible for petrol subsidy, as announced in Budget 2020. The Domestic Trade and Consumer Affairs Ministry (KPDNHEP) has suspended the newly-launched Petrol Subsidy Programme microsite after a tech portal reported that it exposed users’ bank account details. KPDNHEP head of corporate communication, Yunus Tasim, said the ministry is aware and investigating the issue. "Once we got the news, we dec
  9. Red Hat team provides mitigations, promises kernel updates. A cyber-security firm has gone public with details and proof-of-concept (PoC) code about a vulnerability in the Linux kernel that currently impacts only CentOS and Red Hat Enterprise Linux (RHEL) distributions. The vulnerability's name is Mutagen Astronomy and is tracked as CVE-2018-14634. Discovered by the team at the Qualys Research Labs, this security flaw is categorized as a Local Privilege Escalation (LPE) issue. This is a type of vulnerability that requires an attacker to have a foothold
  10. Security problems are usually discovered by geeks and people with a lot of time on their hands, but this is not always the case. In fact a flaw in the security of Xbox One was recently discovered by a five year old boy! While using his father's console,Kristoffer Von Hassel was able to log into his dad's account without having to enter the password used to protect it. The boy was understandably excited at the prospect of gaining unfettered access to the account: "I was, like, "yeah!" " he said. The hack was incredibly simple. After having been presented with the password screen and entering an
  • Create New...