Phwning the boardroom: hacking an Android conference phone
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
Islamic State supporters are being targeted with a modified version of the Telegram Android app that contains a version of the OmniRAT remote access toolkit. The app, named plus_gram.apk, isRead More →
The organization is requesting permission to limit disclosures to only the most severe bugs. The Xen Project has requested feedback from the community in thrashing out new disclosure guidelines whichRead More →
Why using a VPN while surfing Internet on Public Wi-Fi can be a lifesaver. Public Wi-Fi has become a lifeline for people on the go or professionals that travel forRead More →
JavaScript Web Service Proxies are an alternative to WSDL (Web Services Description Language) files for interacting with WCF Web Services. The proxy files function as a description of the webRead More →
There’s a disturbing possibility that the Mexican government, the soda industry, or some combination of both used spyware to harass health advocates who support Mexico’s soft-drink tax. According to aRead More →
Watering hole attacks attempt to infect more than 100 organizations in 31 different countries. Organizations in 31 countries have been targeted in a new wave of attacks which has beenRead More →
Dutch malware experts have found a new malware strain that targets online shops running on the Magento platform, which can self-heal using code hidden in the website’s database. While thisRead More →
Amster-damn, that’s a hell of a vulnerability to make browser bug exploitation easier. Researchers in Europe have developed a way to exploit a common computer processor feature to bypass aRead More →
Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups. APT28, the Russian hacking group tied to last year’s interference in the 2016 presidential election, has long been knownRead More →