exploit Archive

Buffer Overflow Attacks

In an era where everything is digitized, there is always some scope for a loophole or vulnerability. This loophole forms the crux where hackers squeeze in their mischievous codes and hence flourish their business. You may expect a businessman to cut loose his profit, but you can never bargain on an attacker to miss vulnerability

SQL Injection – Still a favorite technique among hackers

Hacking groups and the most common technique they use (“SQL Injection”) Once consigned to those shadows of the computer underground, hacking has become a common practice! The news of Cyber security breaches manage to make it to the daily newsfeed of some country each day. With household names like LulzSec and Anonymous gaining more popularity

Adobe Flash Player CVE-2014-0497

  Adobe Flash Player CVE-2014-0497 Another flash exploit…. Security focus, one of the most respected sites by hackers all over the world – reports that a remote execution exploit has been detected for Adobe Flash Player. This vulnerability is affecting Windows, Mac and Linux operating systems and the potential risk this leads to made the