CALL US

+91 9610101337

Category: Articles

Flaws In Contactless Visa Card, Hacker Can Bypass It’s Spending Limits

By Prempal Singh 0 Comment August 5, 2019

Researchers have discovered a technique for exploiting Visa card frauds. The contactless Visa card vulnerability can allow the attacker to bypass payment limit checks. that requires a user’s verification. The attackers can exploit the flaw via man-in-the-middle attacks to conduct large-scale fraud. As mentioned in a blog post, researchers of Positive Technologies, tested the exploit […]

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Prempal Singh 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

Millions of users tricked into Installing Fake Samsung Firmware Update App

By Prempal Singh 0 Comment August 2, 2019

We live in an era of technology, where we pretty much depend on everything on the devices. With upgrading technology, every day different companies try to introduce new products to make them stand out in front of competitors.  However, there are many smartphone companies but the most popular is Samsung. People love Samsung devices for […]

OXID eShop

eCommerce Sites Exposed Due To New Vulnerability found on ‘OXID eShop’ Software

By Prempal Singh 0 Comment August 2, 2019

An e-commerce website with  OXID eShop platform can be compromised because of some critical flaws, to prevent your e-commerce site immediately you need to update it. As we know OXID eShop is one of the top e-commerce shop software solutions from Germany whose enterprise edition is being used by industry superiors including Mercedes, BitBurger, and […]

Spearphone Cyber Attack

Latest Attack on Android Known As “Spearphone Attack”

By Prempal Singh 0 Comment August 1, 2019

“Spearphone Attack ” The New Attack, Lets Android Apps Capture Loudspeaker Data Without Any Privileges  Research revealing how more than 1300 Android apps are collecting sensitive data even when users have explicitly denied the required permissions. Primarily observed by the researcher that how developers abuse multiple procedures around to collect location data, phone identifiers, and […]

error: Content is protected by Cyberops !!