Mandiant – FireEye has disclosed the details of a serious information disclosure vulnerability affecting one of the Qualcomm software package widely used. Security researchers from the Mandiant firm have discovered a âhigh severityâ vulnerability in the Qualcomm tethering controller (CVE-2016-2060) that could be exploited by a malicious application to access user information. Recently Google released an Android update that addresses […]
The Channel 2 journalist and Consumer Investigator Jim Strickland investigated a mysterious car theft after he received home security camera footage showing a car thief in action. The Channel 2 journalist and Consumer Investigator Jim Strickland investigated a mysterious car theft after he received home security camera footage from a viewer in Walton County. It seems […]
OpenSSL has the patches for six flaws including two high-severity bugs that could allow attackers to decrypt HTTPS traffic and execute malicious code on the server. OpenSSL just released several patches to fix vulnerabilities in the open-source cryptographic library, including a couple of high-severity flaws (CVE-2016-2107, CVE-2016-2108) that could be exploited to decrypt HTTPS Traffic. The CVE-2016-2107 could […]
Researchers at Palo Alto Networks have come across a new threat used by alleged Iran-linked Hackers in attacks since 2007. Security experts at Palo Alto Networks discovered a new malware, named Infy, that has been likely used by hackers from Iran in cyber espionage operations at least since 2007. The researchers discovered the Infy malware […]
Security researchers have discovered multiple flaws in the Samsung Smart Home automation system that could be exploited by remote attackers. Security researchers from the University of Michigan have discovered multiple flaws affecting the Samsung Smart Home automation system that could be exploited by remote attackers for several attacks, including making keys for connecting front door locks. […]
A serious expert discovered a flaw in PwnedList service that could have been exploited to access millions of account credentials managed by the service. A serious vulnerability found in the PwnedList could have been exploited by hackers to gain access to millions of account credentials collected by the service. The service PwnedList allow users to check if […]
Doubts about a couple of draft anti car hacking laws, they could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity of connected components that could be easily compromised knowing the communication protocol used by principal vendors. The interest in car hacking gained […]
Watch now and learn to Bypass Modern WAF’s Exemplified at XSS in another Series of Garage4hackers Ranchoddas Webcast. Garage4hackers presents Ranchoddas Webcast Series on Bypassing Modern WAF’s Exemplified At XSS by Rafay Baloch Let me explain you how will you be benefited productively by watching this video. The speaker will start at a very beginner […]
The CESG is considered the Information Security Arm of GCHQ, it has disclosed more than 20 vulnerabilities affecting multiple software this year. The British intelligence agency GCHQ has disclosed more than 20 vulnerabilities affecting multiple software. The information was shared by a GCHQ spokesperson with the Motherboard. The flaws were discovered by the CESG (Communications-Electronics Security Group), which […]
An interview with Pete Herzog, the co-founder and Managing Director of ISECOM, about the Hacker Highschool (HHS) initiative. Today’s teens are in a world with major communication and productivity channels open to them and they don’t have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them […]