Here’s a Spy Firm’s Price List for Secret Hacker Techniques
THE TRADE IN the secret hacker techniques known as “zero day exploits” has long taken place in the dark, hidden from the companies whose software those exploits target, and fromRead More →
THE TRADE IN the secret hacker techniques known as “zero day exploits” has long taken place in the dark, hidden from the companies whose software those exploits target, and fromRead More →
Every once in a while we get a glimpse into rare and strange behavior that doesn’t involve the website being hacked, but causes major problems for website owners. We haveRead More →
In a new Ubuntu Security Notice (USN-2814-1), Canonical announced that they have patched a security vulnerability in the Nvidia proprietary graphics drivers for all supported Ubuntu Linux operating systems. AccordingRead More →
CARNEGIE MELLON’S researchers pulled their talk on cracking the protections of the anonymity software Tor from the schedule of the Black Hat security conference in 2014, the university has beenRead More →
Hide your Windows 10 & Edge browser, Dyreza is coming!. A new variant of the Dyreza banking trojan comes with support for Microsoft’s latest products, the Windows 10 operating system andRead More →
loud access keys hardcoded inside apps leave users exposed to data theft, and developers vulnerable to server hijacking Researchers from the Technical University in Darmstadt, Germany, have carried out anRead More →
Digital rights group takes down Pawn Storm base. The (EFF) has been awarded control of its namesake domain, which was being used to install malware on people’s computers. The EFFRead More →
Reformed hacker says that US government websites especially FBI and Home Office are easiest to hack. You would be surprised to know that one of the easiest sites to hackRead More →
A potential standard for securing network-connected pacemakers, automobiles, and other lightweight devices has suffered a potentially game-over setback after researchers developed a practical attack that obtains its secret cryptographic key.Read More →
At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s behaving properly. Whilst doing this recently,Liam found aRead More →
Often we come across times where binary reconstruction while analyzing malware / unpacking malware is required . Taking leverage of automated tools is not always useful, sometimes manual reconstruction isRead More →
Microsoft squashes offline logic flaw that makes lost laptops dynamite. Blackhat Europe Synopsys security boffin Ian Haken says un-patched PCs in enterprises are at risk of having user accounts poppedRead More →
Expect a new ransomware version in the coming weeks.The Linux.Encoder.1 ransomware, a special strand that has a taste for Web hosting and source code repositories, has managed to spread toRead More →
VXers stuff evidence-purging malware in retailer stockings. Threat researchers are warning of two pieces of point of sales malware that have gone largely undetected during years of retail wrecking andRead More →
Attackers could have had full control over DT’s Web server. Independent Egyptian security researcher Ebrahim Hegazy has found another vulnerability, and this one affected the Web servers of Deutsche Telekom, Germany’sRead More →
Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched. The problem for that is thatRead More →
It didn’t take long for Anonymous members to rally and swear payback for the recent ISIS terror attacks that took place in Paris, France, on Friday, November 13, 2015. HavingRead More →
Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked the personal details of around 7,000 officers. TheRead More →
Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery campaigns. One such example is a campaign detectedRead More →
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that it’s the plot point of a network TVRead More →