Monthly archives: Jul 2015


Days after a security flaw in Android’s media playback system Stagefright was publicly revealed, threatening nearly a billion Android devices, another wide-reaching security flaw could be used to make a victim’s Android device completely unresponsive. According to security firm Trend Micro, which publicly disclosed info about the vulnerability Wednesday, the […]

Security flaw can render an Android device temporarily useless














Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to fix them. The flaws could potentially be exploited to execute malicious code on computers when users visit compromised websites or open specially crafted documents. They were reported through Hewlett-Packard’s Zero […]

Unpatched vulnerabilities in Internet Explorer


uTorrent is a firm favorite when it comes to BitTorrent clients, making its money through in-app ads and bundled software offered during installation. But it seems that this software may be causing some problems for uTorrent, which is now being flagged as ‘harmful’ by association. As TorrentFreak reports, uTorrent is […]

uTorrent is being blocked by Google Chrome and anti-virus vendors



Google has updated the stable channel of Chrome to version 44.0.2403.89. In addition to new features, which Google plans to detail these days, the latest release addressed a total of 43 security issues. The list of vulnerabilities reported by external researchers includes 12 high severity bugs. Judging by the rewards […]

Google Patches 43 Vulnerabilities With Release of Chrome 44


HACKING TEAM AND BOEING SUBSIDIARY INSITU , ENVISIONED DRONES DEPLOYING SPYWARE. There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiary Insitu would like to be able to deliver spyware via drone. The plan is described in internal emails from […]

Hacking Team at it again. Look what the drone dragged ...


In the past thirty days an increase attack activity has been observed using the “njRAT” malware. This remote access trojan (RAT) has capabilities to log keystrokes, access the victim’s camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim’s desktop, perform process, file, and registry […]

njRAT : Uncovered