Wi-Fi Alliance announces WPA3
The Wi-Fi Alliance announced the WPA3 standard officially on Monday. The new wireless network security standard will replace WPA2 eventually. WPA2, which stands for Wi-Fi Protected Access 2, is theRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
The Wi-Fi Alliance announced the WPA3 standard officially on Monday. The new wireless network security standard will replace WPA2 eventually. WPA2, which stands for Wi-Fi Protected Access 2, is theRead More →
Exploit published in December makes cracking unpatched Oracle servers easy. In a report published on January 7 by SANS Technology Institute, Morphus Labs researcher Renato Marinho revealed what appears to be anRead More →
ESET researchers have found that Turla, the notorious state-sponsored cyberespionage group, has added a fresh weapon to its arsenal that is being used in new campaigns targeting embassies and consulatesRead More →
For the Crackme0x02, I’ll follow two approaches. First, I’m going to find out the password through analysis. Then, I’ll modify the program in order to accept any password. If you’reRead More →
For almost two years, hackers could have easily stolen your prized stash of bitcoins if you were keeping them in the popular software wallet Electrum, thanks to a critical securityRead More →
China has been tightening controls over internet content and last year shut down 128,000 so-called harmful websites. China shut as many as 128,000 websites that contained obscene and other “harmful”Read More →
Is that incriminating data in your pocket or are you just pleased to see me? Over the holidays I bought Apple’s newest, shiniest face scanner. For the first fortnight –Read More →
A comprehensive guide for choosing and setting up secure Wi-Fi. our router, that box sitting in a corner of your house giving you internet access, is in many ways moreRead More →
Some weeks ago I read about this Starbucks case where hackers hijacked laptops on the WiFi network to use the devices computing power to mine cryptocurrency, and I thought it might beRead More →
Researchers have discovered severe vulnerabilities in the suite which can lead to full system takeover. Security researchers have discovered a set of zero-day vulnerabilities within the Dell EMC Data ProtectionRead More →
Intel said no slowdown likely to be noticed by average users. One of the biggest concerns over the Meltdown and Spectre patches supposed to fix vulnerabilities in Intel, AMD, andRead More →
Sometimes at Exploitee.rs, we look for fun devices to hack and sometimes the devices find us. Today we’re going to talk about a recent time where we found ourselves inRead More →
The iPhone maker has confirmed all Mac systems and devices running iOS are affected by the vulnerabilities, but also said there are currently no known exploits. Apple has issued a statement regardingRead More →
A slew of online services used to manage GPS- and GSM-based location tracking devices have been found vulnerable to flaws that could allow attackers to hijack these devices and revealRead More →
No user interaction required – and the exploit could’ve been used to distribute any form of malware. A vulnerability in Google Apps Script could have allowed attackers to use GoogleRead More →
Earlier today, we reported on some shocking news — there is a serious vulnerability that affects Intel processors. To make matters worse, patching that vulnerability — now known as “Meltdown” —Read More →
Hackers in Argentina found a way to exploit computers over public WiFi and use them to mine bitcoin. How do we stay secure as public internet access becomes more common?Read More →
Most of you are familiar about Cross Site Request Forgery (CSRF) vulnerability, it is one of the most common vulnerabilities; it was listed in OWASP Top 10 – 2013. Previously,Read More →
Password Managers have been around for quite some time, and most of us rely on them for managing our passwords across several websites. Services like LastPass, 1Pass, and KeePass haveRead More →
Recently security researcher’s from enSilo group presented new evasion technique called Process Doppelgänging at Blackhat Europe-2017. This technique bypasses most popular Antivirus, NGFW and EDR solutions present in the market. This techniqueRead More →