Hacker found a way to hack Facebook by exploiting the ImageMagick flaw
I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many processingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many processingRead More →
Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel. NamedRead More →
A security expert discovered a flaw in the Facebook Messenger audio clip recording feature that could be exploited to listen to audio chats. Voice recording is one of the mostRead More →
Alarmed by allegations of Russian meddling in the 2016 US presidential race, French authorities have warned political parties against the threat of cyber attacks as the country prepares to electRead More →
Exclusive: Privacy campaigners criticise WhatsApp vulnerability as a ‘huge threat to freedom of speech’ and warn it could be exploited by government agencies A security backdoor that can be usedRead More →
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA – Direct Memory Access. Once code execution is gained in UEFI/EFI Runtime ServicesRead More →
Researchers claim that the malware is currently priced at $4,000 and comes with ‘bot killer’ features. Security researchers have uncovered a new malware strain, dubbed Nuke, put up for saleRead More →
Cracking The 12+ Character Password Barrier, Literally 12 Characters? Are you serious?! What do I mean by cracking 12 characters passwords and above? I’m simply stating that with modern hardware,Read More →
The number of hijacked MongoDB servers held for ransom has skyrocketed in the past two days from 10,500 to over 28,200, thanks in large part to the involvement of aRead More →
Bootmode exploit gave attackers ability to hack modem, eavesdrop on calls. Google has shut down a “high-severity” exploit in its Nexus 6 and 6P phones which gave attackers with USBRead More →
My friends at CyberBlog decided to analyze the GM Bot Android Malware as exercise aiming to receive feedback sand suggestions from the security community. The sample explored is confirmed as a variantRead More →
Some financial institutions are now offering so-called “cardless ATM” transactions that allow customers to withdraw cash using nothing more than their mobile phones. But as the following story illustrates, this new technologyRead More →
MongoDB administrators are about to be tought a hard lesson in database management practices, as the number of hackers that are now involved with DB hijacking attempts has gone fromRead More →
The notorious black hat hacker CyberZeist (@cyberzeist2) has broken into the FBI website FBI.gov and leaked data on Pastebin. The notorious black hat hacker CyberZeist (@cyberzeist2) has broken into theRead More →
A cyber-crime infrastructure known in infosec circles as pseudo-Darkleech has been the source of many ransomware infections during the past year, either by malicious spam attachments or via automated attacksRead More →
Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons backRead More →
On the last day of 2016, KeepKey, a vendor of Bitcoin hardware wallets, has notified users of a security breach that inadvertently exposed some of its customers’ details. According toRead More →
The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix for this vulnerability as part of bulletin MS16-135.Read More →
Changing travelers flight bookings is too easy. Absolutely astounding the Karsten Nohl research on the insecurity of traveler flight information. The current travel booking systems is deeply insecure, it lacksRead More →
Facebook has started nudging people to not only create live videos, but consume them too. An update automatically pushes more live video to your smartphone screen. A bunch of peopleRead More →