Three SAP Vulnerabilities You Need to Patch Right Now If you are using SAP mobile than your private information is at risk even if it is…
Author: Security Zap
Hackers Install Malicious ROMMON Images on CISCO Devices
Hackers Install Malicious ROMMON Images on CISCO Devices CISCO Product Security Incident Response Team or PSIRT monitors CISCO products for vulnerabilities and attacks and publishes reports…
Download Kali Linux 2
Download Kali Linux 2 In July 2015 Kali Linux 2 was announced. And today a long awaited cyber security swiss army knife has been released. You…
NIST Released SHA-3 Cryptographic Hash Standard
NIST Released SHA-3 Cryptographic Hash Standard NIST, the National Institute of Standards and Technology, has released the final version of Search Hash Algorithm-3 (SHA). SHA-3…
Stagefright Android Vulnerability: Google Fixes Issue Affecting 1B Devices
Google Fixes Stagefright Android Vulnerability Affecting 1B Devices Yesterday Sprint pushed LMY48I updates to Nexus 5 and Nexus 6 devices in order to fix StageFright android…
Yahoo Ads Network Was Serving Malware
If You Have Visited Yahoo You Might Be Affected With Malware We all have heard about malware-laden ads, ads leading to downloading malware, but never…
