CALL US

+91 9116117170

Category: Latest Vulnerabilities

New iPhone and Mac-book camera hack

By Devashish Soni 0 Comment April 4, 2020

If you are using iPhone, MacBook or Apple, here is a piece of alarming news for you Turns out that merely visiting a website — not just malicious one also the legitimate sites unknowingly loading malicious ads on them can give access to your device’s location, microphone, your camera, and in some cases, saved passwords […]

Cookiethief:- A Cookie Stealing Malware For Android

By Yash Kudal 0 Comment March 17, 2020

A new but dangerous version of Android malware has been discovered that steals users authentication cookies from web browsers and other applications, including Chrome and Facebook, which are installed on compromised devices. The malware is called “Cookiethief” which is commonly known as Kaspersky Trojan which works by retrieving the root privileges on the target device, […]

Critical Vulnerability lets Attackers Remotely Exploit Linux Systems & Gain Root Access

By Aneesh A S 0 Comment March 6, 2020

US-CERT issued an advisory warning users of a new critical 17-year-old remote code execution vulnerability [CVE-2020-8597] affecting the PPP daemon (pppd) software that comes installed on all Linux based operating systems. The software also powers the firmware of many other networking devices. pppd software is an implementation of Point-to-Point Protocol (PPP) that helps enabling communication […]

Android Banking Malware Stealing 2FA Codes From Google Authenticator

By Yash Kudal 0 Comment March 2, 2020

Security experts have discovered a new type of Android malware that can extract and steal one-time passcode (OTP) generated by Google Authenticator. A team of investigators say that they have seen an OTP stealing ability in Cerberus, a new android banking trojan which was launched last year. As per reports, the current type of Cerberus […]

What is Privilege Escalation?

By Annu Choudhari 0 Comment August 10, 2019

Privilege escalation is that attack in which an attacker exploits a software bug to gain access to a resource that is usually protected by the application or user, which leads to a change in privileges for malicious actions that are carried out with greater privileges than expected application developer and system administrator. Known attacks of […]

error: Content is protected by Cyberops !!