Hack This: Where To Write Code
The code itself, the symbols and strings that eventually dictate the behavior of a machine, is one thing, but properly preparing it and executing it requires a dedicated venue. YourRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
The code itself, the symbols and strings that eventually dictate the behavior of a machine, is one thing, but properly preparing it and executing it requires a dedicated venue. YourRead More →
Following a failed takedown attempt, changes made to the Mirai malware variant responsible for building one of today’s biggest botnets of IoT devices will make it incredibly harder for authoritiesRead More →
The exploitation of the CrashDB code injection issue could allow an attacker to remotely execute arbitrary code on machines running Ubuntu Linux distro. New problems for Ubuntu Linux distribution, the securityRead More →
If your desktop runs a mainstream release of Linux, chances are you’re vulnerable. If you run a mainstream distribution of Linux on a desktop computer, there’s a good chance securityRead More →
Short Bytes: Security firm Cynet has discovered a critical issue that affects the privacy of 1-billion Facebook Messenger users. Dubbed Originull, this flaw is also expected to affect millions of other websitesRead More →
McAfee patches flaws in its Linux security solution. Remote code execution flaws found in McAfee VirusScan Enterprise for Linux could allow an attacker to obtain root privileges, and a securityRead More →
Developers at the Tor Project have started working on a sandboxed version of the Tor Browser, currently available as an early alpha version for Linux systems. Sandboxing is a securityRead More →
President Barack Obama has ordered US intelligence agencies to deeper investigate the alleged Russian interference with the 2016 Presidential Election. President Barack Obama is going to close his Presidential mandate,Read More →
It’s time to patch your Linux servers and PCs again. The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad newsRead More →
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more. The trojan’sRead More →
wrote-password-cracking-manual. Password cracking has always been this niche activity during a routine pentest. You collect some hashes, fire up John The Ripper or Hashcat, and use default settings with rulesRead More →
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites. This spamRead More →
Dirty COW (designated as CVE-2016-5195) is a Linux vulnerability that was first disclosed to the public in October 2016. It was a serious privilege escalation flaw that allowed an attacker toRead More →
Hacking, which was once considered the exclusive domain of the “experts” has become very common phenomenon with the rise of technology and advancements in the mobile field. Android phones areRead More →
Millions of readers who visited popular news websites have been targeted by a series of malicious ads redirecting to an exploit kit exploiting several Flash vulnerabilities. Since at least theRead More →
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers can exploit the backdoor account via a well-craftedRead More →
Security researchers find easy to exploit vulnerability. North Korea is one of those countries whose governments pushed for the migration to a domestically-developed operating system that’s supposed to be moreRead More →
Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai. Which is the most dreaded botnet in theRead More →
Only real defense for billions of devices is physically capping ports. Last year we wrote about the “USB Killer”—a DIY USB stick that fried almost everything (laptops, smartphones, consoles, cars) thatRead More →
For six months, the remote management app has opened users to code-execution attacks. For at least the past six months, a popular remote management app available in the official GoogleRead More →