PDF, a portable file format, had gained popularity among general users due to its extensive features, portability and availability of free tools to read and author […]
Vulnerabilities, malwares and exploits have been out there since the existence of software themselves. Running with malicious intentions, these programs have always been a thorn in […]
Exploit Database recently found an interesting vulnerability regarding Godaddy which is a leading domain and website hosting provider. The Godaddy workspace XSS vulnerability provides liberty to […]
With rampant downsizing in most organizations, corporations now face new frontiers in their efforts in keeping their data secured. Uncertainty amongst employees leads to more dubious […]
Conficker.A and Conficker.B created around 250 domains per day from which they downloaded the updates or atleast tried to download. Unlikely, Conficker.C creates 50,000 domains per […]