Category: Vulnerability

Dell SupportAssist vulnerability

Dell SupportAssist vulnerability affects 30 million PCs

Recently, security researchers discovered four security vulnerabilities in the BIOSConnect feature of Dell SupportAssist. These vulnerabilities allow attackers to remotely execute code in the BIOS of the affected device. According to the official Dell...

Google Play sharing

Google launches new experimental Abuse Bug Bounty program

Google announced a new experimental abuse research funding program for abuse-related strategies and product issues outside the scope of existing vulnerability research funding and vulnerability reward programs (VRP). According to the introduction, the amount...

Scheme Flooding vulnerability

Scheme Flooding vulnerability reveals user privacy

Fingerprintjs, a developer of network fraud detection solutions, was researching anti-fraud technologies, it unexpectedly discovered that major browsers have program flood vulnerabilities. The test found that Google browser, Firefox browser, Tor Onion browser, and...

WiFi FragAttacks vulnerability

New WiFi FragAttacks vulnerability exposed

Some network security researchers have discovered a series of different vulnerabilities in the wireless transmission protocol, that is, WiFi. These vulnerabilities are all related to the way WiFi handles large blocks of data, some...