CALL US

+91 8219776763

Category: Vulnerabilities

Malicious Google Chrome extension collected user’s data for third parties

By Prempal Singh 0 Comment May 18, 2017

A bug in Google’s popular web browser Chrome could permit bad actors to place a malicious record onto a target computer system that could then be used to siphon off Windows identity and start a Server Message Block (SMB) relay attack, relating to a post by Bosko Stankovic, an information security engineer at DefenseCode. Stankovic […]

The vulnerability, which allows to gain control of WordPress through password reset form

By Prempal Singh 0 Comment May 5, 2017

In the WordPress web-content management system revealed the vulnerability ( the CVE-2017-8295 ), allowing us to obtain control of the account through the manipulation of the password reset form. In particular, an attacker can not pass the required authentication arrange to send letters to the owner of the account with the password reset code and […]

A vulnerability in the implementation of the NFS-Servers shipped in the Linux kernel

By Prempal Singh 0 Comment May 5, 2017

The NFS server (NFSv2 and NFSv3), part of the Linux kernel, detected remotely operated vulnerability ( CVE-2017-7895 ), allowing to read the contents of memory areas of arbitrary user space and the kernel (1 to 4 Mb) by sending queries to the specially designed NFS. For a successful attack must have available on the NFS-section […]

Dirty Cow : Linux Most Dangerous Bug

By Prempal Singh 0 Comment October 25, 2016

Linux Operating System seen as a high levels of security which is immune to bugs and crashes. Though it has high levels of security, but the fact is in addition there are problems with this operating system. The most recent drawback found out is in the nucleus and there they have stayed for the past 9 […]

What is MITM (Men-In-The-Middle-Attack)

By Prempal Singh 1 Comment August 29, 2016

Overview A man-in-the-middle attack is a kind of cyber-attack where attacker inserts him/her into a conversation between two parties, try to impress both sides and gains access to information that both parties are trying to send to each other. A man-in-the-middle attack allows a malicious attacker to interception between sender and receiver sides. Attacker can send […]

error: Content is protected by Cyberops !!