If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store. Simon Scannell, a researcher at RIPS Technologies GmbH, discovered an arbitrary file deletion vulnerability in the popular WooCommerce plugin that...
Magento is one of the most popular e-commerce platforms. But researchers found that is highly vulnerable to cyber attacks. Foregenix, a global cybersecurity firm based in Johannesburg has performed security scans and analysis on 842 African websites that use Magento and revealed...
Securing online accounts with the two-factor authentication is not the effective way anymore. One mysterious group has been defeating the account protection in attempts to phish upwards of 1,000 people, according to the human rights group Amnesty International. The group has...
I have a question for your friends. How many Emails you get per day. The answer may differ but around many. The emails may have attachments files also. I always think twice before opening creepy looking email attachments, especially word and...
Google has started sending out email to those who were affected by the latest Google+ API bug that was disclosed in December 2018. This notification provides details regarding what profile data was exposed and the apps that had access...
Solid State Drives or SSDs serve as a convenient method to store data. They become safer when they offer self-encryption. These devices offer hardware encryption, eliminating the need for encryption software. However, some researchers have discovered security flaws in...
Google always want to keep its user secure. So It is going to take another step. Google is working on the drive-by-downloads protection on Chrome browser. Google is in the process of adding the support for automatic blocking of drive-by...
phpMyAdmin is one of the most popular and widely used MySQL database management systems. its developers have released an updated version 4.8.4 of its software to patch several major vulnerabilities. These vulnerabilities eventually allow remote attackers to take control...
PewDiePie is the number one YouTube Channel in the world. In a mass security breach aimed to promote the superstar PewDiePie. Thousands of printers around the world have again been hijacked. We have seen before this once. Hackers gain control of thousands...
Facebook exposed private photos of 6.8 million users to apps that weren’t supposed to see them, The company said this. These apps have authorized access to see a limited set of users’ photos. But the bug allowed them to see pictures...
0FansLike
0FollowersFollow
377SubscribersSubscribe

Recent Posts