CVE 2015-7547 glibc getaddrinfo() DNS Vulnerability
Hello w0rld! JUMPSEC researchers have spent some time on the glibc DNS vulnerability indexed as CVE 2015-7547 (It hasn’t got a cool name like GHOST unfortunately…). It appears to beRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
Hello w0rld! JUMPSEC researchers have spent some time on the glibc DNS vulnerability indexed as CVE 2015-7547 (It hasn’t got a cool name like GHOST unfortunately…). It appears to beRead More →
Printed electronics makes the perfect fake fingerprint. Boffins from Michigan State University have loaded up an inkjet printer with cartridges designed for printing electronic circuits, and used the output to foolRead More →
It appears that the KeRanger Mac ransomware has roots in Linux, not Windows, as many were expecting to. A big surprise was revealed today by security researchers from Romanian antivirus companyRead More →
The Government wants backdoor access to our devices so that it can protect us from terrorists and defend matters of national security. Even if its intentions are good, there areRead More →
The South Korean NIS revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The South Korean National Intelligence Service (NIS) revealed that North Korea had hackedRead More →
Step 1. Simply take over a victim’s mobile phone number. NatWest is tightening up its internet banking systems after security shortcomings were exposed by journalists. BBC hacks were able to hijackRead More →
A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen. A number of bypass vulnerabilities still affect iOS devicesRead More →
Federal Reserve officials deny the incident took place. Serious accusations have been made today by Bangladesh’s central bank, which has said that hackers breached its US Federal Reserve account and stoleRead More →
An Indian restaurant recommendation site contains injected code which redirects users to the Angler EK, which in turn drops TeslaCrypt (Trojan.Cryptolocker.N) on the computer. A popular Indian restaurant recommendation siteRead More →
A security researcher has discovered a Facebook password reset vulnerability that allowed him to brute force into any FB account. The security researcher Anand Prakash has discovered a password reset vulnerability affecting Facebook. TheRead More →
Craig Smith does car hacking as safely as possible. The softly-spoken security researcher doesn’t take risks like cutting cars’ power on public roads, as executed on a Jeep by researchers last year. Indeed,Read More →
ome users might be able to remove KeRanger before it starts its encryption process and locks up all their files. Yesterday, the first ever fully functional ransomware family targeting Maccomputers hasRead More →
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be tracked, and even hacked, if they use insecureRead More →
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnelRead More →
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has managed to hack the Transmission BitTorrent client forRead More →
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware solutions and sandboxing technologies. Another factor is the continuousRead More →
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including phishing and watering hole sites. Researchers at ProofpointRead More →
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is not interesting to know that what they didRead More →
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet services accessible by a “.onion” address on theRead More →