Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Author: WALLONN7 - Replies: 1 - Views: 3874
Vulnerability Allows Windows 10 to Be Hijacked, Even When Locked
Vulnerability Allows Windows 10 to Be Hijacked, Even When Locked

The flaw can be exploited via digital assistant Cortana

[align=center][b]A vulnerability in Windows 10 allows attackers to easily hijack a computer even when locked, all by simply relying on digital assistant Cortan
Author: vidi - Replies: 0 - Views: 3630
Vulnerability or Not? Pen Tester Quarrels With Software Maker
A SpiderLabs security researcher has published details of what he considers to be a vulnerability in the RLM web application provided by Reprise Software. Reprise CEO Matt Christiano has told SecurityWeek, it is not a vulnerability.

[align=left][size=medium][size=medium]RLM is the Reprise License Manager, described by Reprise as "a flexible and easy-to-use license manager with the power to serve enterprise users." The researcher is Adrian Prutean
Author: MaskedUser - Replies: 3 - Views: 3280
Vega Vulnerability Scanner x64
Vega helps you find and fix cross-site scripting (XSS), SQL injection, and more.
Vega is a free and open source web security scanner and web security testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.
Vega can help you find vulnerabilities such as: reflected cross-s
Author: mastersteven - Replies: 0 - Views: 2885
Linux Fixes For Bleeding Tooth" Bluetooth Vulnerability Are Available
BleedingTooth is a remote code execution vulnerability affecting all Linux kernels going back to Linux 4.8. It allows an attacker within Bluetooth range to execute code on remote systems if Bluetooth is turned on the remote system and it's set to be discoverable thanks to a combination of security issues in the BlueZ library and heap-based type confusion on the Linux kernels L2CAP code.

[Image: https://i.imgur.com/azkWDKO.jpg]
[i]The BleedingTooth Bluetooth vulnerability in action.[