Category: Vulnerability

Scheme Flooding vulnerability

Scheme Flooding vulnerability reveals user privacy

Fingerprintjs, a developer of network fraud detection solutions, was researching anti-fraud technologies, it unexpectedly discovered that major browsers have program flood vulnerabilities. The test found that Google browser, Firefox browser, Tor Onion browser, and...

WiFi FragAttacks vulnerability

New WiFi FragAttacks vulnerability exposed

Some network security researchers have discovered a series of different vulnerabilities in the wireless transmission protocol, that is, WiFi. These vulnerabilities are all related to the way WiFi handles large blocks of data, some...