Exploiting Recursion in the Linux Kernel
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on Ubuntu if the system was installed with homeRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on Ubuntu if the system was installed with homeRead More →
An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media. Politicians are a privileged target of hackers, in manyRead More →
Selfrando is an alternative to ASLR memory randomization. At the start of June, the Tor Project released version 6.5a1 of the Tor Browser, but compared to previous releases, this one alsoRead More →
Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos thanRead More →
Even where users have chosen strong passwords and taken extrasecurity measures, their Facebook FB -0.29% accounts are not safe from hackers. Researchers have proven just that by taking control of a FacebookRead More →
Vpon is one of many mobile ad SDKs marketed towards mainland Chinese and Taiwanese developers and app users. Recently, FireEye mobile security researchers identified a branch of Vpon ad SDKRead More →
A DODGY new device can clone up to 15 contactless bank cards every second. Crooks use the hi-tech hacking unit to fund shopping sprees using stolen details. The scanner skims detailsRead More →
A short while ago, slipstream/RoL dropped an exploit for the ASUS memory mapping driver (ASMMAP/ASMMAP64) which was vulnerable to complete physical memory access (read/write) to unprivileged users, allowing for localRead More →
When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked.Read More →
How Chipzilla and Microsoft hope to get one step ahead of hackers. Intel is pushing a neat technique that could block malware infections on computers at the processor level. That’s theRead More →