Please turn on your JavaScript for this page to function normally.
Facebook invites white hats to attack its corporate network

Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …

Scan Android for unpatched vulnerabilities

X-Ray scans your Android device to determine whether there are vulnerabilities that remain unpatched by your carrier. The X-Ray app presents you with a list of vulnerabilities …

Detecting mobile device vulnerabilities using Nessus

This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.

Oracle releases 87 security fixes

The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …

Yahoo! closes security hole that led to huge password breach

Yahoo! has patched the security hole that allowed hackers to access some 450,000 email addresses and passwords associated with Yahoo! Contributor Network and ultimately …

Instagram “Friendship Vulnerability” patched

A flaw in the popular Instagram app that allows potential snoopers to add themselves as friends of any Instagram user and, consequently, to access his or hers private …

Microsoft releases nine security bulletins

The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …

Security vulnerabilities of DVB chipsets

This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …

Microsoft to release nine bulletins

The Microsoft Security Bulletin Advance Notification for July 2012 contains nine bulletins, with three listed as “critical” and six listed as …

Facebook API bug deletes contact info on users’ phones

If you thought that Facebook’s recent unannounced change of its users’ email address tied with their account to Facebook ones was bad, you’ll be livid if you …

Blackhole exploit kit got upgraded

Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack …

Radical reduction in online vulnerabilities

WhiteHat Security reviewed serious vulnerabilities in websites during 2011, examining the severity and duration of the most critical vulnerabilities from 7,000 websites across …

Don't miss

Cybersecurity news