Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]
The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR. Yesterday I reported the news of two critical vulnerabilities that affect the popular TrueCryptTrueCrypt application and the related risks for the users, today a new zero-day flaw is threatening million of users of the latest […]
The US Air Force is using a modified EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks. Information warfare is overlapping traditional military domains, in order to conduct a fight in the air it is possible to used new hacking techniques as the US Air Force demonstrated. According to the Maj. Gen. […]
Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as Gaza cybergang. A group of hackers known as “Gaza cybergang” and “Gaza Hackers Team” has been targeting IT and Incident Response Team in the Mena (Middle East North Africa) area. The Gaza cybergang appears to be […]
Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic as possible. Mr. Robot has been the breakthrough of summer for series lovers, especially for those who are fans of technology and computing. One of the major advantages of Mr. Robot over other series has […]
Experts at Akamai discovered the Linux XOR DDoS Botnet, a malicious infrastructure used to run potent DDoS attacks against dozens of targets. Security researchers have discovered a Linux Botnet, dubbed XOR DDoS or Xor.DDoS botnet, that is targeting gaming and education websites with potent DDoS attacks with reached 150 gigabytes per second of malicious traffic. According […]
The researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popularmulti-channel commerce platform Shopify. Shopify is a multi-channel commerce platform that helps people sell online, in-store, and everywhere in between. The popular security researchers Davis Sopas at WebSegura has discovered a Reflected Filename Download vulnerability in the Shopify service. Sopas already sent a security report to Shopify explaining […]
Security experts at CloudFlare observed a major DDoS attack against one of their customers that appeared to leverage a mobile ad network. CloudFlare firms revealed that one of its customers was recently hit by a distributed denial-of-service (DDoS) attack that appeared to leverage a mobile ad network and malicious JavaScript. The experts explained that the DDoS attack […]
The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control server with multiple advantages for attackers. Establish a backdoor is one of the main goals for an attacker in order to gain persistence over the targeted machines. There are many hacking tools that allow easily to […]
A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like techniques. Hacker forums still exist, hacking communities are with good shape and growing. Hacker Forums are normally hard to find and once you find them you will see them change again. Most prolific Hacker forums […]