HIKVISION PATCHES BACKDOOR IN IP CAMERAS
Hikvision, a Chinese manufacturer of video surveillance equipment, recently patched a backdoor in a slew of its cameras that could have made it possible for a remote attacker to gainRead More →
Hikvision, a Chinese manufacturer of video surveillance equipment, recently patched a backdoor in a slew of its cameras that could have made it possible for a remote attacker to gainRead More →
Real-time full-blown snooping with breakable encryption. The UK government has secretly drawn up more details of its new bulk surveillance powers – awarding itself the ability to monitor Brits’ liveRead More →
Embedding a shortcut (.lnk file) which points to powershell (accompanied by an encoded command) in a word document or zip file is a known sneaky trick to spread malware. TheRead More →
A former sysadmin is facing up to ten years in prison and a fine of up to $250,000 after he used a backdoor account and sabotaged his former employer onRead More →
The Brits join US intelligence agencies who’d want a backdoor into the encryption feature on all services. End-to-end encryption services like WhatsApp are once more being slammed for offering protectionRead More →
The BitErrant attack is a fun little exploit that shows what can go wrong in the BitTorrent protocol when SHA1 collisions become reality. SHA1 collisions resulting in chunks of theRead More →
Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The backdoor is present in almost all devices producedRead More →
Transferring Backdoor Payloads by DNS AAAA records and IPv6 Address. in this article i want to explain how can use IPv6 Address (AAAA) records in DNStraffic for Transferring Payloads. In myRead More →
Spyware is defined as a “generic term for a range of surreptitious malware such as keyloggers, remote access trojans, and backdoor trojans, especially those that allow remote surveillance of passwordsRead More →
A recently discussed feature in WhatsApp, the messaging app used by more than 1 billion people worldwide, is not a backdoor. That’s the message from an open letter written byRead More →
Exclusive: Privacy campaigners criticise WhatsApp vulnerability as a ‘huge threat to freedom of speech’ and warn it could be exploited by government agencies A security backdoor that can be usedRead More →
we will detail our discovery of the next two versions of MM Core, namely “BigBoss” (2.2-LNK) and “SillyGoose” (2.3-LNK). Attacks using “BigBoss” appear likely to have occurred since mid-2015, whereas “SillyGoose” appears to haveRead More →
Last week, a report published by the House of Representatives Judiciary Committee and the House of Representatives Energy and Commerce Committee has made it crystal clear that the US governmentRead More →
Barnes & Noble has joined the list of Android device vendors who sold smartphones and tablets affected by the Adups backdoor. According to the findings of Linux Journal reporter CharlesRead More →
A soon-to-be-deprecated API included with Skype for Mac contains a vulnerability that allows an attacker to bypass authentication procedures and query for user data or interact with a local SkypeRead More →
In the second half of 2016, ESET researchers identified a unique malicious toolset that was used in targeted cyberattacks against high-value targets in the Ukrainian financial sector. We believe that theRead More →
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers can exploit the backdoor account via a well-craftedRead More →
The technical nature of cyber crime can sometimes obscure the fact that creating, using, and distributing malware, phishing kits and other threats is a business, albeit an illegitimate one. LikeRead More →
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on whichRead More →
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators will clean up the infection and look noRead More →