Breaking News
Building a Digital Coupon Strategy: 9 Steps to Success
Removing the impedance for a vibrant electronics industry in India
Evanescence Approach Dramatically Improves Solid-Surface Heat Transfer
Three Motor Driver ICs in the CELUS Design Platform Are Available for Access
Goldman Sachs gives senior managers a new perk: ‘Flexible vacation’ policy
  • Home
  • Privacy Policy
  • Contact Us !
  • Home
  • ALL DEALS
  • CLOTHING
  • COMPUTERS
  • COUPONS
  • ELECTRONICS
  • HOME & GARDEN
  • NEWS
  • Home
  • ALL DEALS
  • CLOTHING
  • COMPUTERS
  • COUPONS
  • ELECTRONICS
  • HOME & GARDEN
  • NEWS
You are here: Home  /  Vulnerability
  • Phishing emails: IT dept sends over 100 fraud links to cyber
    By: sristy Saha

Archives

  • COMPUTERS
    January 4, 2017
    Adobe Announces Flash Vulnerability, Hackers Can Control Your Computer
    By: sristy Saha

    Adobe recently announced a vulnerability in its Flash Player and has issued a security update to patch up the hole. Media reports warn the vulnerability could allow attackers to remotely seize control of your Windows, Mac or Linux computer. Adobe’s announcement, after the vulnerability was reported by Kaspersky Labs, also included details about two web […]

  • COMPUTERS
    November 13, 2016
    Adobe Announces Flash Vulnerability, Hackers Can Control Your Computer
    By: sristy Saha

    Adobe recently announced a vulnerability in its Flash Player and has issued a security update to patch up the hole. Media reports warn the vulnerability could allow attackers to remotely seize control of your Windows, Mac or Linux computer. Adobe’s announcement, after the vulnerability was reported by Kaspersky Labs, also included details about two web […]

  • COMPUTERS
    August 8, 2016
    ‘BadBarcode’ Vulnerability in Barcode Sensors Can Be Used to Hack Computers
    By: sristy Saha

    Imagine somebody walking to a checking counter at an airport, and using his boarding pass to hack a nearby computer. That isn’t a plot taken from sci-fi movies, it’s something that can be in news in the coming days. A researcher has demonstrated a method of creating malicious barcode strings that could allow an attacker […]

  • COMPUTERS
    March 18, 2016
    Eight-Year-Old Vulnerability Exposes Thousands of Apps, Devices to Attack
    By: sristy Saha

    Researchers have discovered a critical vulnerability in the GNU C Library, glibc, which is exposing many Unix-based systems such as Linux servers to a range of security attacks. According to estimates, hundreds of thousands of devices, as well as apps utilising the GNU free software project are believed to be vulnerable. All versions of glibc […]

May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Apr    
  • Building a Digital Coupon Strategy: 9 Steps to Success
    By: admin
  • Removing the impedance for a vibrant electronics industry in India
    By: Loknath Das
  • Evanescence Approach Dramatically Improves Solid-Surface Heat Transfer
    By: admin
  • Three Motor Driver ICs in the CELUS Design Platform Are Available for Access
    By: admin
  • Goldman Sachs gives senior managers a new perk: ‘Flexible vacation’ policy
    By: Loknath Das
  • The Smart Way to Provide Coupons: The Launch of MoEngage Coupons
    By: admin
  • Essential Hints and Tips for Mastering Microsoft OneNote
    By: admin
  • 6G Intelligence and Integration Connectivity
    By: admin
  • What Is Assembly Language?
    By: Loknath Das
  • Electronic sustainability: How recyclable printed circuit boards are changing the industry
    By: admin
  • Benefits of Bamboo Fabric Clothing: Future of Fashion
    By: admin
  • The AMD Radeon RX 6600 XT competes directly with the Nvidia RTX 3060 in terms of price and features
    By: admin
  • 10 White Pant Matching Shirt Combinations Ideas For Men
    By: admin
  • 101 Fashion Blog Post Ideas from Our Ultimate List
    By: admin
  • Optimizing motor control for energy efficiency
    By: admin
  • Parfait: Empowering private man-made intelligence with research devices
    By: admin
  • Chain of Specialists: Huge language models working together on lengthy setting undertakings
    By: admin
  • 6 Methods for drawing certain lines on Your Kid’s Utilization of Gadgets
    By: Loknath Das
  • Rebate Coupon Formats
    By: Loknath Das
  • Go Computerized to Take advantage of Coupons
    By: Loknath Das
  • A huge improvement to our OAI-PMH feed
    By: admin
  • Economical, Reused Indian Furniture for Your Home
    By: admin