VMware issued a security update to fix a critical vulnerability in the VMware Client Integration Plugin, apply it as soon as possible. VMware issued a Security Advisory related to a critical security vulnerability (CVE-2016-2076) in the VMware Client Integration Plugin urging administrators to urgently apply the needed patch. The flaw could be exploited by attackers to […]
During the Q&A session at Kenyon College last week, the FBI Director explained that he uses tape to mitigate the danger of cyber espionage. Privacy and security are top priorities for some security experts that are aware of threat actors’ capabilities, so I’m not surprised that the FBI Director James Comey uses to cover his laptop webcam […]
A couple of security experts demonstrated that iOS date bug was still present in iOS devices and it was exploitable by spoofing an Apple NTP server. Do you remember the Apple iOS date bug? In February, the security community highlighted the existence of the embarrassing problem for Apple iOS mobile devices running 64-bit iOS 8 or higher, […]
Modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked Do you know that modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked? The circumstance is serious if we […]
Swedish experts warned of an electronic warfare attack on its air traffic control systems occurred in November. Is it electronic warfare? Swedish experts suspect that the attack on its air traffic control systems last November was operated by Russian nation-state hackers, the Arlanda, Landvetter and Bromma airport reported the major problems. The Swedish experts believe the cyber attacks were […]
A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-end encryption to protect its users from eavesdropping, many other companies are adopting the technical improvement, but there are some circumstances that still open their customers to […]
Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated in less than 10 seconds. Security researchers have analyzed the code of Petya ransomware in order to devise a method to allow victims to restore encrypted files. The experts have been able to develop a decryption tool […]
Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the world. Not always crime pays, sometimes the bill can be very salty, this is the case of a British youngster from Worcestershire, Grant Manser, that has pleaded guilty to six charges under the Computer Misuse Act and […]
Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to Japanese companies. Sprout, the cybersecurity firm in Japan has launched BugBounty.jp (https://bugbounty.jp/), which is the first bug bounty platform in Japan designed to Japanese companies easily run bug bounty programs, and get helps from white hat hackers around the […]
A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The security experts Suphannee Sivakorn, Iasonas Polakis, and Angelos D. Keromytis have devised an attack technique against Facebook and Google reCaptcha. The boffins from the Department of Computer Science at Columbia University have discovered security vulnerabilities […]