A security expert discovered a cross-site request forgery (CSRF) flaw to take over domains registered with GoDaddy, the company has already fixed it. The security engineer Dylan Saccomanni discovered a critical cross-site request forgery (CSRF) vulnerability in GoDaddy domain management console that could be exploited by attackers to take over domains. The vulnerability was discovered on January 17 […]
A security researcher demonstrated that “car hacking” is reality through the exploitation of vulnerable Can Insurance Dongle. Million vehicles at risk. Car hacking is a reality, we have discussed the topic several times and we have learned that modern vehicles have a complex internal networking infrastructure that could be subject to cyber attacks. The news […]
The VLC open-source media player is affected by two security vulnerabilities that can allow an attacker to run arbitrary code on vulnerable machines. Some versions of the popular VLC open-source media player are affected by two memory corruption vulnerabilities that could be exploited by an attacker to run arbitrary code on vulnerable machines. The couple of vulnerabilities was […]
GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in China. This time the popular Outlook email service was allegedly hacked by Chinese authorities. The Outlook email service was not reachable in China over the weekend and according the to experts at the GreatFire organization, Chinese Government run a man-in-the-middle […]
Security expert discovered a critical flaw in Verizon’s FiOS mobile app that could be exploited to access the email account of any Verizon customer. A new critical vulnerability in exposing million accounts to cyber threats, this time the flaw affects the Verizon FiOS mobile app and could be exploited by attackers to access the email account […]
FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM social media accounts and provided by members of Anonymous. The FBI is investigating on IP addresses released by the Anonymous collective in a wake of the hijacking of the US CENTCOM social media accounts. Anonymous members have collected the IP […]
The Spanish security researcher Eduardo Novella has disclosed details of two critical vulnerabilities affecting a specific ADB Pirelli home wireless router. The security researcher at Dutch security audit firm Fox-IT, Eduardo Novella, has discovered two critical vulnerabilities affecting a model of ADB Pirelli home wireless router. Novella decided to publicly disclose the vulnerabilities because the […]
The website of the popular Notepad++ editor was hacked and defaced by hacktivists protesting against the recently released “Je suis Charlie” edition. Members of the Tunisian hacking crew named “Hackers of the Fallaga Team” have compromised and defaced a large number of French websites following the Charlie Hebdo terrorist attack. Hundreds of French websites have been […]
Security researcher Samy Kamkar has designed a USB wall charger dubbed KeySweeper, which secretly logs keystrokes from Microsoft wireless keyboards nearby. Security researcher Samy Kamkar has designed a cheap USB wall charger that can eavesdrop on almost any Microsoft wireless keyboard. The stealthy Arduino-based device, dubbed “KeySweeper“, works like a generic USB mobile charger, but he has the capability […]
ISIS supporters have hacked the YouTube and Twitter accounts belonging to the US CENTCOM leaking online internal documents stolen from mobile devices. While Anonymous started the #OpCharlieHebdo campaign against jihadist websites to avenge the attack against the Charlie Hebdo, hackers of the CyberCaliphate group, claiming to support the terrorist group ISIS, have compromised the official […]