Posts

Showing posts with the label vulnerabilities

Researcher Discover A New Method to Crack iPhone Passcode

Image
Do you think you are safe if you have an iPhone locked with a passcode?. A researcher has discovered a glitch that makes your iPhone passcode easy to crack. According to his discovery, a hacker can easily brute force your phone’s passcode without any data loss. A Hacker Can Easily Crack Your iPhone Passcode Since 2014, iPhone passcodes serve as the ‘first line of defense’ against intruders. These 4 or 6 digit codes are quite difficult to crack, and multiple attempts of entering passcodes will wipe the device. iPhone limits the number of attempts to enter a passcode. However, a security researcher, Matthew Hickey, has discovered an easy way to bypass this limit. According to him, instead of entering combinations of multiple four or six-digit codes, a single long string with various supposed codes (without spaces) will bypass the limit. This can be done by connecting the device to a computer. This glitch is actually present in the iOS. So, all devices ...

E-Commerce Websites Exposed To Hackers Due To Vulnerable WordPress Plugins

Image
Researchers at ThreatPress, WordPress’ security firm, confirm that several Multidot WordPress plugins bugs made e-commerce websites vulnerable to hacking. Ten WordPress plugins designed for e-commerce websites were disabled as the developers failed to release patches. These plugins were developed for sites powered by WooCommerce. ThreatPress Identify Some Multidot WordPress Plugins As ‘Dangerous’ In a on Thursday, ThreatPress highlighted ten different WordPress plugins designed specifically for e-Commerce websites as ‘dangerous’. All these plugins belonged to the same company According to the researchers, these plugins pose a severe threat to all online business websites powered by WooCommerce and using one of these plugins. The researchers identified cross-site request forgery(CSRF), stored cross-site scripting (XSS), and SQL injection vulnerabilities, which any hacker could exploit to upload keyloggers, crypto-miners, shells, and other malicious software. In f...