GIF Processing Vulnerability Affects More than 28,300 Android Apps
November 28th, 2019 📆 | 5849 Views ⚑
WhatsApp recently patched a vulnerability that allows remote attackers to execute arbitrary code or cause a DoS situation. The vulnerability
November 28th, 2019 📆 | 5849 Views ⚑
WhatsApp recently patched a vulnerability that allows remote attackers to execute arbitrary code or cause a DoS situation. The vulnerability
November 27th, 2019 📆 | 8236 Views ⚑
A vulnerability was found in Ipa up to 4.6.6/4.7.3/4.8.2 and classified as problematic. Affected by this issue is an unknown
November 26th, 2019 📆 | 2507 Views ⚑
Cybercriminals have devised a card-skimming scheme that involves creating a phishing page that impersonates a retailer’s third-party payment service platform
October 18th, 2019 📆 | 2603 Views ⚑
Cybercriminals have devised a phishing campaign that that takes aim at customers of the online payment processing company Stripe, with
October 13th, 2019 📆 | 4043 Views ⚑
A vulnerability was found in Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS and classified as problematic. This issue affects some unknown processing
October 10th, 2019 📆 | 4530 Views ⚑
We have encountered a Windows kernel crash in the win32k.sys driver while processing a corrupted TTF font file. An example
September 24th, 2019 📆 | 5382 Views ⚑
The scalability, flexibility, easy access, and cost savings of the cloud have made it easier than ever for organizations to
September 12th, 2019 📆 | 4510 Views ⚑
Microsoft DirectWrite is a modern Windows API for high-quality text rendering. A majority of its code resides in the DWrite.dll
September 12th, 2019 📆 | 2312 Views ⚑
Microsoft DirectWrite is a modern Windows API for high-quality text rendering. A majority of its code resides in the DWrite.dll
July 25th, 2019 📆 | 7815 Views ⚑
The digital touch iMessage extension can read out of bounds if a malformed Tap message contains a color array that
July 10th, 2019 📆 | 8000 Views ⚑
Researchers have designed, fabricated and validated a co-processor called CoPHEE that enables computations to be done directly on encrypted data.
May 27th, 2019 📆 | 2349 Views ⚑
Visual Voicemail (VVM) is a feature of mobile devices that allows voicemail to be read in an email-like format. Carriers
May 4th, 2019 📆 | 6481 Views ⚑
CVSS Meta Temp Score Current Exploit Price (≈) 5.3 $5k-$25k A vulnerability was found in Cisco ASA and Firepower Threat
April 3rd, 2019 📆 | 3489 Views ⚑
The Apache Kafka Streams library is used by enterprises around the world to perform distributed stream processing on top of
March 26th, 2019 📆 | 4653 Views ⚑
Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a
March 26th, 2019 📆 | 5126 Views ⚑
Quantum communication, which ensures absolute data security, is one of the most advanced branches of the "second quantum revolution." In
February 20th, 2019 📆 | 4193 Views ⚑
FaceTime suffers from a memory corruption vulnerability in texture processing. MD5 | b453c6f5d49e62c37885c285bc9f79cd Download Source: packetstormsecurity.com
January 19th, 2019 📆 | 7450 Views ⚑
A security expert discovered a zero-day flaw in the processing of VCard files that could be exploited by a remote attacker
August 7th, 2017 📆 | 5030 Views ⚑
Evan Kohilas http://2017.pycon-au.org/schedule/presentation/20/ #pyconau This talk was given at PyCon Australia 2017 which was held from 3-8 August, 2017 in
February 13th, 2017 📆 | 7187 Views ⚑
CF117 – Forensics – Chapter 04 – Processing a crime scene Guide to computer Forensics and Investigations 5th ED 2017-02-13
December 1st, 2014 📆 | 1946 Views ⚑
Increase the concentration of ores using STEINERT’s dual-energy x-ray sorter 2014-12-01 02:37:44 source
June 3rd, 2012 📆 | 5756 Views ⚑
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387. 2012-06-03 13:36:54 source
Comments