Security experts at Duo Security have discovered a serious flaw in the implementation of two-factor authentication which allow attackers to bypass it. Two-factor authentication processes if flawed could give to companies a false sense of security even if we are discussing of PayPal. In the past we have explained how to by-pass Two-factor authentication in various ways, for example, using […]
More than 32000 servers containing motherboards manufactured by Supermicro expose admin passwords in the clear, it is a godsend for hackers. A significant number of servers containing motherboards manufactured by Supermicro exposes administrator passwords, the situation is worrying considering that the problem is well known and a series of patches has been already released to fix […]
Security experts at Zimperium firm revealed that LinkedIn users could be potentially vulnerable to Man-in-the-Middle attacks leveraging an SSL stripping. A new research is scaring users of LinkedIn revealing that they could be potentially vulnerable to Man-in-the-Middle (MITM) attacks leveraging an SSL stripping. Despite the US security firm Zimperium reported the problem to LinkedIn more than a […]
The popular hacker George Hotz, also known as Geohot, as releases a one click tool dubbed Towelroot to root Android devices exploiting a known Linux flaw. The popular hacker George Hotz, also known as Geohot, has designed a root tool called Towelroot that will let most Android smartphones users to root their device without a particular effort and technical knowledge. […]
The Italian security firm Tiger Security issued a report on the current state of cyber attacks against the organization of the Brazil 2014 World Cup. The Italian firm Tiger Security is one of the companies in charge to monitor cyber security of the Brazil 2014 World Cup, in these hours its experts have issued an interesting report titled […]
The American multinational giant AT&T confirmed to have suffered a data breach last April, personal data of an unknown number of users was exposed. The American multinational telecommunications corporation AT&T confirmed to have suffered a data breach last April, personal information of an unknown number of users was accessed by employees of one of its contractor. AT&T […]
A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions on the victim’s device. Google has recently made a significant change to the management process for permissions on Android devices, unfortunately security experts noticed that the change could advantage bad actors that intend to conduct attacks against the mobile […]
Israeli researchers presented the air-gap network hacking technique to compromise a system, even if it is isolated from the Internet, using a cellphone. Researchers at Ben Gurion University presented a study on the hacking technique dubbed air-gap network hacking which allows an attacker to inoculate a specific type of malware into a cellphone and use the mobile device as […]
Razvan Cernaianu user described a method by which PayPal users could double their amount of money related to their account endlessly. The expert at Cyber Smart Defence TinKode a.k.a Razvan Cernaianu claimed to have found a loophole in the PayPal service, for the precision in its Chargeback Process, which could be exploited by a bad actor to increase his balance […]
As promised the collective Anonymous has started the opHackingCup hacking campaign against the Brazilian Government agencies and many other organizations. The group of Anonymous hacktivists a few hours before the start of the Brazil World Cup have started its hacking campaign against Brazilian Government organizations’ websites and official World Cup website (www.worldcup2014.gov.br), many other organizations are suffering […]