search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Security News
  • Cyber Attacks
  • Malware
  • Vulnerabilities
putty-ssh-trojan

PuTTY SSH Client Contains Trojan and Steals Information

Posted on May 20, 2015May 22, 2015 by Security Zap

Putty holds important place in system administrator’s toolkit as it allows encrypted connection to remote servers. But today Putty ssh client injected with trojan appeared…

Posted in Malware, Security NewsTagged malware, putty ssh, trojanLeave a Comment on PuTTY SSH Client Contains Trojan and Steals Information
netusb-vulnerability

NetUSB Bug Makes Millions of Routers Vulnerable

Posted on May 20, 2015May 22, 2015 by Security Zap

Carnegie Mellon University CERT uncovered important security flaw in KCode NetUSB. NetUSB is a Linux kernel module of small Taiwanese company KCodes that adds USB over IP…

Posted in Cyber Attacks, VulnerabilitiesTagged buffer overflow, netusb, router1 Comment on NetUSB Bug Makes Millions of Routers Vulnerable
eset antivirus

ESET Free Purchase Vulnerability

Posted on May 19, 2015January 18, 2016 by Security Zap

ESET vulnerability has been uncovered by Egyptian geeks. This authentication bug allowed a security researcher to generate millions of valid licenses for NOD 32 antivirus…

Posted in VulnerabilitiesTagged antivirus bug, application hacking, authentication bypassLeave a Comment on ESET Free Purchase Vulnerability

China Develops Devastating Cyber Weapon – Chinese Cyber Attacks

Posted on May 19, 2015September 23, 2015 by Security Zap

According to the annual report of DoD China is close to developing another cyber weapon capable of unplugging internet jack from an entire nation’s infrastructure….

Posted in Cyber AttacksTagged china, china cyberwarfare, chinese cyber attacksLeave a Comment on China Develops Devastating Cyber Weapon – Chinese Cyber Attacks
malware

Document Based Malware Software Tool – Microsoft Word Intruder

Posted on May 18, 2015September 23, 2015 by Security Zap

Microsoft Word Intruder According to nakedsecurity the new tool Microsoft Word Intruder or MWI allows anyone to develop a high level malware software. It is thought…

Posted in Malware, Security NewsTagged malware, malware software, malware tool, microsoft word vulnerabilityLeave a Comment on Document Based Malware Software Tool – Microsoft Word Intruder
venom vulnerability

VENOM Vulnerability

Posted on May 18, 2015December 31, 2015 by Security Zap

What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…

Posted in Security News, VulnerabilitiesTagged data center, floppy disk controller, venom vulnerabilityLeave a Comment on VENOM Vulnerability

Posts navigation

Previous 1 … 102 103 104 Next

Search

Recent Posts

  • What Is Shortcut Virus and How Can You Get Rid of It?
  • Firefox Lockbox for Android: How It Works and How to Use It
  • How to Remove Backdoor.Vexdoor Virus (Step-By-Step Guide)
  • Clear App Cache or Clear App Data? – What They Are & How to Use Them
  • What Are Facebook’s Whitehat Settings and How Can You Enable Them?
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us