CALL US

+91 9116117170

Author: Mohammed Tahir

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Mohammed Tahir 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

OXID eShop

eCommerce Sites Exposed Due To New Vulnerability found on ‘OXID eShop’ Software

By Mohammed Tahir 0 Comment August 2, 2019

An e-commerce website with  OXID eShop platform can be compromised because of some critical flaws, to prevent your e-commerce site immediately you need to update it. As we know OXID eShop is one of the top e-commerce shop software solutions from Germany whose enterprise edition is being used by industry superiors including Mercedes, BitBurger, and […]

Spearphone Cyber Attack

Latest Attack on Android Known As “Spearphone Attack”

By Mohammed Tahir 0 Comment August 1, 2019

“Spearphone Attack ” The New Attack, Lets Android Apps Capture Loudspeaker Data Without Any Privileges  Research revealing how more than 1300 Android apps are collecting sensitive data even when users have explicitly denied the required permissions. Primarily observed by the researcher that how developers abuse multiple procedures around to collect location data, phone identifiers, and […]

Media File Jacking

By Mohammed Tahir 0 Comment August 1, 2019

According to new research by Symantec have shared a detailed report regarding a media file jacking flaw threatening Android apps. According to their research hackers can simply manipulate media files transferred over WhatsApp, Telegram, and Android applications. Neither the sender nor the receiving user would ever notice this manipulation. The attack does however only work […]

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Mohammed Tahir 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

error: Content is protected by Cyberops !!