vulnerability
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112051/tools-400x200.jpg)
Severe flaws patched in libarchive, dependent projects urged to follow
Three severe bugs that could be easily exploited to perform arbitrary code execution have been patched with version 3.2.1 of the libarchive open source multi-format archive …
![match](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111901/match-400x200.jpg)
The DAO is under attack, a third of its ether reserves stolen
The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195531/facebook-wide-400x200.jpg)
How attackers can hijack your Facebook account
Positive Technologies researchers have demonstrated that knowing a user’s phone number and how to exploit a vulnerability in the SS7 network is enough to hijack that …
![cisco small business router](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111917/cisco-small-business-router-400x200.jpg)
Cisco’s small business Wi-Fi routers open to attack, no patch available
Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …
![Adobe Flash](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112505/adobe_flash-400x200.jpg)
Adobe Flash zero-day actively exploited in targeted attacks
A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in limited, targeted attacks, the company has …
![Netgear D6000](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111939/Netgear-D6000-400x200.jpg)
Netgear removes crypto keys hard-coded in routers
Qualys security researcher Mandar Jadhav has discovered two serious vulnerabilities in Netgear D6000 and D3600 modem routers, which can be exploited to gain access to the …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112836/google-chrome-400x200.jpg)
Bug in Chrome’s PDF reader allows arbitrary code execution
Vulnerabilities in software often arise from faulty implementations of elements developed by other code writers. Take for example CVE-2016-1681, the heap-based buffer overflow …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112101/facebook-400x200.jpg)
Vulnerabilities in Facebook Chat and Messenger exploitable with basic HTML knowledge
Check Point’s security research team has discovered vulnerabilities in Facebook’s standard online Chat function, and its separately downloaded Messenger app. The …
![Ubee EVW3226](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112105/UbeeEVW3226-400x200.jpg)
Flaws in Ubee router can facilitate attacks on connected networks
Researchers have discovered five critical vulnerabilities in Ubee EVW3226, a VoIP cable modem router used by operators across Europe, which can be exploited to compromise the …
![Lenovo](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113512/lenovo-400x200.jpg)
Lenovo tells users to uninstall vulnerable Accelerator app
In the wake of Duo Security’s report on the critical vulnerabilities sported by Original Equipment Manufacturer (OEM) updaters loaded on popular laptop and desktop …
![KeePass](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112146/keepass-400x200.jpg)
KeePass update check MitM flaw can lead to malicious downloads
Open source password manager KeePass sports a MitM vulnerability that could allow attackers to trick users into downloading malware disguised as a software update, security …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195248/bug-400x200.jpg)
Bug poachers target businesses, demand money for bug info
Businesses are being hit with an extortion attempt based on attackers penetrating their network or websites and stealing corporate or user data. The attackers don’t say …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?