vulnerability

Oracle WebLogic Server Web Services Fixes a Critical Bug

June 3, 2021
Thumbnail image for Oracle WebLogic Server Web Services Fixes a Critical Bug

This blog gives details about the updated fixes in the WebLogic Server services of Oracle. Interested aspirants who would like to get along with the career in Oracle can get this Oracle service bus training available online. Let us now begin with patches and end with the recent vulnerability fixes in the oracle. Patches for […]

Read the full article →

WordPress Security Checklist: Protect Your Website from Being Hacked

May 25, 2021
Thumbnail image for WordPress Security Checklist: Protect Your Website from Being Hacked

WordPress is a favored Content Management System (CMS)-it is the easiest mean to build a blog or website. Approximately 40.0% of the web is empowered by WordPress. There is a large community that is responsible for its success. These aspects make it the main target of hackers. So, the WordPress website security should not be […]

Read the full article →

10 Essential Network Vulnerability Scanning Tools

September 24, 2018
Thumbnail image for 10 Essential Network Vulnerability Scanning Tools

Network security is of prime importance in today’s world, hence network scanning, or rather network vulnerability scanning, has a crucial role to play as regards the overall security of any enterprise and the data that it handles. Here’s a look at the top 10 essential network vulnerability scanning tools available today: HackerCombat Network Security Scanner […]

Read the full article →

Hackers and Smartphone Vulnerabilities

June 14, 2017
Thumbnail image for Hackers and Smartphone Vulnerabilities

Because of flaws and vulnerabilities found in software, your smartphone is very susceptible to attacks from hackers. Unknowingly, you can download a seemingly harmless app and bring about malware, spyware, or viruses to your Android device. The most recent malware campaign that occurred, called Judy malware, was hidden amongst  roughly 40 apps found in the […]

Read the full article →

Twitter Cross Site (XSS) Vulnerability – Watch Out!

August 28, 2009
Thumbnail image for Twitter Cross Site (XSS) Vulnerability – Watch Out!

James Slater, IT developer with a British firm that specializes in search engine optimization, has found a security vulnerability in the social network, Twitter. The simple act of reading tweets online on twitter.com could cause somebody to steal your login cookie and potentially get access to your Twitter account – or simply redirect you to […]

Read the full article →

iPhone SMS vulnerability allows eavesdropping

July 3, 2009

Wooops! Charlie Miller, OS X security expert, discovered a rather serious flaw in the SMS-part of the iPhone and presented his findings at the SyScan conference in Singapore recently. The hole in the SMS software allows for a remote person to run software code on the iPhone and monitor the location of iPhone using GPS, […]

Read the full article →