The security researcher Marco Vaz discovered a serious vulnerability in Belkin n750 router that could be exploited to gain root access on affected devices. A serious flaw in a Belkin router could be exploited locally by an unauthenticated attacker to gain full control over affected devices. The company has already issued a patch to fix […]
Two models of Linksys routers running SMART Wi-Fi Firmware remain vulnerable to a pair of vulnerabilities recently patched by the company. Linksys EA2700 and EA3500 are the two routers running Linksys SMART Wi-Fi firmware that are still affected by a couple of vulnerabilities recently patched in different models of the Belkin-owned networking gear. On October 31th, […]
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]
Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small drones in a few seconds. The Chinese Government has completed the development of a new weapon that is able to hit and shoot down small drones and aircraft in a few seconds. The China has successfully tested a highly […]
A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share attacks. The documents disclosed by Eduard Snowden on surveillance activities has caused a spike in the demand of privacy tools and solutions like the TextSecure Private Messenger app that we sill discuss in this post. TextSecure is a […]
The security expert David Longenecker discovered that the update process for ASUS Wireless Routers RT Series is vulnerable to Man-in-the-Middle attacks. The security expert David Longenecker discovered that ASUS Wireless Routers RT Series are vulnerable to Man-in-the-Middle attacks. The researcher explained that that the routers download updates via HTTP without an encryption protocols as explained in the blog post by Longenecker. […]
A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was compromised unless patched. Earlier this month, Drupal patched a critical SQL injection vulnerability (CVE-2014-3704) that exists in all Drupal core 7.x versions up to the recently-released 7.32 version, which fixed the issue. There is an emergency in the […]
The part 6 of the Fappening archive is online, it includes image of Nicola Peltz, Krysten Ritter, Angie Miller, Aubrey Cleland and Tobie Perciva. The effects of the Fappening, aka the iCloud Hack, are still evident in the cyberspace. Relentless hackers have released over the weekend a new archive, it is the part 6 of the […]
The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. Once again Tor network is under attack, the researcher Josh Pitts of Leviathan Security Group has identified a Tor exit node that was used to patch the binaries downloaded by the […]
The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using iOS 8 and iOS 8.1 The Jailbreak for the new iOS 8.1 is available on the Internets, The Chinese jailbreaking team Pangu has just released an application that allows Apple users to jailbreak their mobile devices, including iPhones, […]