iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group.Its name is the Trident: aRead More →
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group.Its name is the Trident: aRead More →
Google declined to classify this as a security issue. British security researcher Aidan Woods discovered an issue on Google’s login page that allows clever attackers to automatically download files on theRead More →
Concern about more attacks mounting as presidential elections approach. Someone using servers in the US, England, Scotland, and the Netherlands stole voter registration from one state’s Board of Elections website inRead More →
Technique works on virtually all USB drives with no modifications necessary. In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB deviceRead More →
Kaspersky fixes three DoS flaws, one information leak bug. Russian security vendor Kaspersky Lab has recently patched four vulnerabilities in its flagship product, the Kaspersky Internet Security Suite, which allowed attackersRead More →
Roman Seleznev, aka “Track2,” was found guilty of 38 counts relating to fraud and theft. On Thursday, a federal jury in Seattle found Roman Seleznev guilty of stealing millions of creditRead More →
Let’s get into the nitty-gritty. The only way you can reset your password on Facebook (if you’ve forgotten one) is through entering a 6 digit passcode. Well that’s 10⁶ =Read More →
St. Jude Medical declares claim of vulnerability “false and misleading.” Trading in the stock of medical device manufacturer St. Jude Medical was halted Friday afternoon after a dramatic drop in itsRead More →
Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data in one big pot – the server. This allows attackers to focus on one target,Read More →
As the uptake of SSL grows, Tim Blombery, systems engineer at A10 Networks, said threat actors are increasingly leveraging SSL-based encryption to hide malicious activity. As usage of Secure SocketsRead More →
HTTPS and VPN traffic broken with new semi-practical attack. Two scientists from the French Institute for Research in Computer Science and Automation (INRIA) have published new research that details an attackRead More →
The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new LinuxRead More →
Two hackers were able to steal email addresses and easily crackable passwords from three separate forums in this latest hack. Over 25 million accounts associated with forums hosted by RussianRead More →
More than 600 sites found to be vulnerable to demanding exploit called Sweet32. Researchers have devised a new attack that can decrypt secret session cookies from about 1 percent of theRead More →
The Navis WebAccess application used in the transportation sector worldwide is affected by a high severity SQL injection vulnerability. A software used in the US ports is affected by aRead More →
During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products thatRead More →
With only a small amount of work, ExtraBacon will commandeer new versions of ASA. Recently released code that exploits Cisco System firewalls and has been linked to the National Security AgencyRead More →
More than 800,000 usernames and email addresses were taken, but most of the passwords aren’t readable or easily crackable. The company later confirmed. A hacker has stolen hundreds of thousandsRead More →
Obihai Technology recently patched vulnerabilities in its ObiPhone IP phones that could have led to memory corruption, buffer overflow, and denial of service conditions, among other outcomes. The California-based company manufacturesRead More →
A new ransomware called Alma Locker has been discovered by Proofpoint researcher Darien Huss that encrypts a victim’s data and then demands a ransom of 1 bitcoin within five days. There has been aRead More →