A tale of a DNS exploit: CVE-2015-7547
This post was written by Marek Vavruša and Jaime Cochran, who found out they were both independently working on the same glibc vulnerability attack vectors at 3am last Tuesday. ARead More →
This post was written by Marek Vavruša and Jaime Cochran, who found out they were both independently working on the same glibc vulnerability attack vectors at 3am last Tuesday. ARead More →
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep confidential information or you are a provider ofRead More →
Infection forces patients onto phones and medicos onto faxes. At least two hospitals in Germany have come under attack from ransomware, according to local reports. The alarming incidents follow similarRead More →
Asus lied about its routers’ security, it delayed security patches for months, and now it’s paying the price. A few months back, the US Federal Trade Commission (FTC) filed a complaint againstRead More →
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publiclyRead More →
The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched Microsoft Silverlight vulnerability. Ransomware is becoming one of the most dreaded cyberRead More →
The security expert Troy Hunt discovered that it is possible to remotely control features of a Nissan Leaf via API. The popular security expert Troy Hunt discovered a security vulnerability affectingRead More →
Google and security firm Red Hat have discovered a critical security flaw in the Internet’s Domain Name System (DNS) that affects a library in a universally used protocol. This meansRead More →
Exploits for a vulnerability in Microsoft Silverlight have found their way into the dangerous Angler Exploit Kit a little more than a month after it was patched. French security researcherRead More →
NMAP is an essential tool in any hacker’s arsenal. Originally written by Gordon Lyon aka Fydor, it’s used to locate hosts and services and create a map of the network.Read More →
Attackers exploit eBay’s lackluster security policy. The JSF*** XSS bug that cyber-security firm Check Point discovered two weeks ago is being used in real world attacks on the eBay platform, inRead More →
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker to completely bypass virtualization-based dynamic analysis and whitelist malware. SecurityRead More →
A new vulnerability in the AirDroid App was revealed by Check Point. This vulnerability affects the 50 million AirDroid users around the globe. AirDroid is a device manager app whichRead More →
A troubling vulnerability has been uncovered that may make you think twice about ever even temporarily allowing a friend, partner or acquaintance to use your new LG V10 Android smartphone.Read More →
Since 2008, vulnerability has left apps and hardware open to remote hijacking. Researchers have discovered a potentially catastrophic flaw in one of the Internet’s core building blocks that leaves hundreds orRead More →
Last year, it was revealed that hackers can steal data from any computer via heat and how some technologies can hack into an offline computer and phone. Now, Tel AvivRead More →
Attackers can take over Cisco firewalls and VPN servers. Cisco has released urgent security patches aimed at fixing a security vulnerability in some of its firewall equipment that employs several versionsRead More →
A password reset flaw allowed hacker to hijack numerous Twitter accounts from their original owners. Twitter followers of @god, @emoji, and @vagina were in for surprise today when their favourite TwitterRead More →
Short Bytes: As a part the latest Patch Tuesday, Microsoft released 13 security patches for all version of Windows and other software like Microsoft Office, IE, Flash etc. Out of these,Read More →
Apps that use 3rd-party updater over insecure HTTP channels subject to MiTM attacks. Camtasia, uTorrent, and a large number of other Mac apps are susceptible to man-in-the-middle attacks that installRead More →