A Google Widevine DRM flaw in the Chrome browser can be exploited to easily download videos streamed from websites such as Amazon Prime Video and Netflix. The flaw was discovered by researchers from the Ben-Gurion University of the Negev in Israel and the Telekom Innovation Laboratories in Germany. According to the experts, the issue exists […]
Security experts from Sucuri firm have discovered a large botnet of compromised CCTV devices used by crooks to launch DDoS attacks in the wild. Researchers have encountered a denial-of-service botnet that’s made up of more than 25,000 Internet-connected closed circuit TV devices. We discussed several times about the IoT and the lack security by design that makes […]
Experts from the ISACA organization confirmed that SWIFT hackers have stolen $10 million from a Ukrainian bank through SWIFT system. It is happened again, unknown hackers have stolen $10 million from an unnamed Ukrainian bank through SWIFT loophole. The news was spread by the Kyiv branch of ISACA, the Information Systems Audit and Control Association, that confirmed […]
The Saudi-based group of hackers known as OurMine has another illustrious victim, after Mark Zuckerberg they have also hacked the Google CEO Sundar Pichai’s Quora account. OurMine is a hacking collective that is scaring IT giants, the list of victims is very long and include names like Mark Zuckerberg, Twitter co-founder Evan Williams, David Guetta Daniel Ek, former […]
Lenovo fixed two flaws (CVE-2016-5249, CVE-2016-5248) in the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware. Lenovo has fixed two high severity vulnerabilities, CVE-2016-5249, and CVE-2016-5248, in its Lenovo Solution Center that could be exploited by hackers to gain access to vulnerable machines and to kill any process running on them. The […]
Today I propose you an interview with Cesar Cerrudo, CTO at IOActive Labs, famous for his research on ICS/SCADA, Smart Cities, IoT, software security. Cesar Cerrudo is CTO at IOActive Labs, leading the team in producing ongoing cutting edge research on ICS/SCADA, Smart Cities, IoT, software security. But Cesar, first of all, has chosen the […]
Facebook has fixed a serious logic flaw that could have been exploited by hackers to delete any video uploaded in comments on someone’s Facebook post. Facebook has fixed a serious security vulnerability in the Facebook’s platform that could have been exploited by hackers to delete any video uploaded in comments on someone’s Facebook post. The security […]
Today I propose you an interview with Rahul Sasi, the Founder of Machine learning based cloud security company CloudSek. Rahul Sasi (@fb1h2s) is the Founder of Machine learning based cloud security company CloudSek. He was an Admin member for Garage4hackers.com. He is ePrior to founding CloudSek he was a Sr Engineer at Citrix where he held […]
PayPal has fixed a vulnerability that could have been exploited by attackers to deliver malicious images through the payment pages of the website. The Security researcher Aditya K Sood discovered a vulnerability that could have been exploited by attackers to deliver malicious image through the payment pages of the PayPal website. The expert noticed that the […]
Fansmitter is a new acoustic data exfiltration method devised by a group of researchers from Ben-Gurion University of the Negev. We all know that air-gapped networks aren’t totally secure, in the past, many research groups have devised methods to steal data from computers disconnected from the Internet. It is possible, for example, to exfiltrate data […]