NSA Couldn’t Hack San Bernardino iPhone, Official Says
When the FBI was trying to break into the San Bernardino shooter’s iPhone, many assumed that the NSA would have the technical capability to do so. Turns out, one ofRead More →
When the FBI was trying to break into the San Bernardino shooter’s iPhone, many assumed that the NSA would have the technical capability to do so. Turns out, one ofRead More →
Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile applications. Following Check Point’s responsible discloser, Facebook promptly fixed the vulnerability. What isRead More →
Security experts are warning owners of Mitsubishi Outlander Plug-In Hybrid Electric Vehicle that their cars can be hacked via the automobile’s on-board WiFi network used for remote control of keyRead More →
Bad guys score a victory in their never-ending arms race with defenders. Drive-by attacks that install the once-feared TeslaCrypt crypto ransomware are now able to bypass EMET, a Microsoft-provided tool designedRead More →
Yesterday, FORBES published a profile of a $20 million spy service that exploits weaknesses in a critical piece of telecoms networks known as SS7, short for Signalling System No. 7. The companyRead More →
Before we move on to the MongoDb injections, we must understand what MongoDb exactly is and why we prefer it over other databases. As MongoDb does not use SQL peopleRead More →
Remote-control tool wobbles offline, blames bad passwords for compromises. Updated TeamViewer users say their computers were hijacked and bank accounts emptied all while the software company’s systems mysteriously fell offline. TeamViewerRead More →
New study finds third-party updaters are riddled with critical vulnerabilities. The next time you’re in the market for a new Windows computer, consider this: if it comes from one of theRead More →
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, andRead More →
Cyber security affects all of us, but it only makes the headlines when it’s big companies that are the target of attacks. Threat intelligence provider Anomali has produced a newRead More →
Crooks breaking into enterprise networks are holding data they steal for ransom under the guise they are doing the company a favor by exposing a flaw. The criminal act isRead More →
The serious vulnerabilities impact Samsung’s Knox security sandbox. A number of severe problems have been discovered within the Samsung Knox security system in Android smartphones. Three vulnerabilities affecting Android devices runningRead More →
Over 1.5 billion users in danger thanks to new exploit. A hacker going by the handle BuggiCorp is selling a zero-day vulnerability affecting all Windows OS versions that can allow anRead More →
One can allow a crook to wipe devices clean. Two researchers from Check Point’s mobile security division have uncovered two vulnerabilities in LG’s custom modification of the Android OS which enablesRead More →
Researchers say 70,000 servers belonging to others also at risk. Dozens of HTTPS-protected websites belonging to financial services giant Visa are vulnerable to attacks that allow hackers to inject malicious codeRead More →
A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to pushRead More →
WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from itsRead More →
WPAD name collision issue can lead to MitM attacks. US-CERT has issued a public alert after researchers from the University of Michigan and Verisign Labs discovered a method of leveraging theRead More →
Last week, Gal Beniamini, @laginimaineb published a series of blog posts discussing a chain of exploits that would allow an attacker to take total control of an Android phone byRead More →
More suspects are expected to admit their crimes as well. Vadym Iermolovych, 28, of Kiev, Ukraine, pleaded guilty yesterday for his role in the hacking of business newswire services Marketwired, PRRead More →