Certifi-Gate is the name of a new vulnerability affecting Android mobile devices discovered by Check Point security that could be exploited to control them. Android users had a bad time after discovering the “Stagefright” vulnerability, but unfortunately other security issues are warning them. It was recently discovered a new vulnerability dubbed Certifi-Gate which could be […]
Hackers can compromise airport security networks by using a common laptop, this is the disconcerting discovery of the popular expert Billy Rios. Cyber security from I-Team investigation revealed that hackers could have the ability to shut down an airportâs security network just using a laptop. It is embarrassing read that system designed to improve security of the […]
Researchers from FireEye have revealed that it is possible to attack Android smartphone to remotely steal user’s fingerprints on a “large scale.” Security experts have often expressed concerns regarding the fingerprint management implemented by the principal mobile vendors. Hackers have demonstrated that it is not difficult to trigger vulnerabilities inside systems that manage fingerprints in […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hacking Industrial Ethernet Switches to take over nuclear plants Microsoft Windows 10 spies on you by default Operation Potao â hackers used a trojanized version of TrueCrypt Mt Goxs […]
RollJam is a $30 device designed to exploit a design flaw in the protocol that determines how keys communicate with car and unlock the majority of car doors. The recent hacks of the Jeep Cherokee and the security patch issued by Tesla for its model S have raised the discussion on the car hacking. Now, security experts […]
Two researchers demonstrated how to compromise corporate networks by hacking the Windows Server Update Services and serve malware instead security patches. Security researchers from Context security firm have discovered a technique to serve malware exploiting the Windows update mechanism. The researchers are able to exploit insecurely configured implementations of Windows Server Update Services (WSUS) for an enterprise […]
Mozilla released the version 39.0.3 Firefox to patch a critical 0-day vulnerability that has been exploited in the wild. AÂ zero-day vulnerability in Mozilla FireFox was reported on Wednesday to the company. A user noticed that an ad displayed on a Russian news website was serving an a malicious code. The exploit discovered by the user […]
Security experts from Trend Micro have set up a number of honeypot to study the cyber attacks on vulnerable gas tanks and worldwide. Security researchers at Trend Micro, Kyle Wilhoit and Stephen Hilt have discovered a number of cyber attacks attempting to hack and shut down gas tanks. The researchers have set up honeypots to study […]
Security experts from FireEye demonstrated that Hacking Team leveraged iOS vulnerability to install fake messaging apps implementing a Masque Attack. Another news related with the leak of the Hacking Team‘s hack, this time it was discovered that Hacking Team was capable of compromising IOS devices, even if they werenât jailbroken. To accomplish this, Hacking Team […]
Tesla Motors Inc admitted to have sent an update to patch security vulnerabilities discovered by a couple of cyber security experts. Tesla Motors Inc has announced that it has distributed a software update to fix security vulnerabilities in the Tesla Model S sedan. According to the company an attacker by exploiting the flaw could take […]