Android Phones Can Get Hacked Just by Looking at a PNG Image

Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps. Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of…

Critical Zcash Bug Could Have Allowed ‘Infinite Counterfeit’ Cryptocurrency

The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that could have allowed an attacker to coin an infinite number of Zcash (ZEC). Yes, infinite… like a never-ending source of money. Launched in October 2016, Zcash is a privacy-oriented cryptocurrency that claims to…

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

It’s 2019, and just opening an innocent looking office document file on your system can still allow hackers to compromise your computer. No, I’m not talking about yet another vulnerability in Microsoft Office, but in two other most popular alternatives—LibreOffice and Apache OpenOffice—free, open source office software used by millions of Windows, MacOS and Linux…