+44 (0)203 88 020 88

Vulnerabilities

PDF encryption broken by researchers

Security researchers from two German universities have published details of flaws in document PDF encryption Digitally signed and encrypted PDF documents are widely used: to execute contracts, meet statutory reporting obligations and to protect commercially sensitive information transmitted as email attachment. Breaking PDF digital signatures PDF digital signatures use asymmetric cryptography; that is the signer

PDF encryption broken by researchers Read More »

Qualcomm powered Android phones vulnerable to RCE

At Black Hat 2019 Tencent reveals QualPwn vulnerability which could allow over the air RCE on Android devices using Qualcomm chips The vulnerabilities, known as QualPwn, can be chained together to first compromise the WiFi controller and then overwrite a portion of the Android Kernel. CVE-2019-10539: is a buffer-overflow vulnerability in Qualcomm’s Wi-Fi controller firmware.

Qualcomm powered Android phones vulnerable to RCE Read More »

Scroll to Top