Tag: Vulnerability
AMD CPUs are Vulnerable to Potential Attacks, Resulting in Data Leaks
While the PC community is fighting for the best processor among Intel and AMD, new research reveals the AMD CPUs have a vulnerability that...
Google Chrome Update: Urges Users to Update to its Latest Version
Google Chrome users need to worry a bit now and update their browsers. Their current version of the browser has bugs that can cause...
All Dell PCs with SupportAssist Feature are Vulnerable To Hack
Dell is one of the reputable PC makers in its industry. While it's so trustable by the community, the latest report by Eran Shimony...
300,000+ WordPress Sites Are Open To Administration Access By Two Vulnerable Plugins
Targeting WordPress elements is anticipated. As being the largest CMS currently, plugins of it are often exploited in the one way or other. A...
Chrome Latest Update Corrects Magellan 2.0 Vulnerability, But Still Has A Critical Bug
After Google patching Chrome with Magellan 2.0 vulnerability just recently, the popular browser is said to be having few other bugs that changing user's...
Nvidia Released a Security Patch For Its GeForce Experience Vulnerability
Nvidia has released a patched update to its new GeForce client GFE. This additional software was found to have a security vulnerability discovered recently,...
Dropbox Zero-Day Vulnerability Exploiting Victims by Accessing System Files
The popular file storing platform Dropbox has new vulnerability discovered on its zero-day. The service's updating application has a security flaw that could potentially...
BlueKeep Vulnerability Can Now Be Detected Easily With This New Scanning Tool
As BlueKeep Vulnerability is out there in the wild, many have left it unaddressed due to its gentle approach to date. This was warned...
A Bug in WhatsApp Allows Attackers to Crash The App of Group Members
WhatsApp, being the best messaging platform to date, is not an exception to loopholes and hacks. This messenger has a vulnerability where CheckPoint researchers...
TP-Link Routers Vulnerability: Attackers Can Get Admin Access Easily
Aside from computers and applications, the general hardware we use for connecting to the world is a victim of hacking. Today, experts have found...