Several ASUS routers include a service that listens on UDP broadcast port 9999 on the LAN interface and contains an unauthenticated command execution flaw. The Security researchers Joshua Drake discovered a serious vulnerability in the firmware running on several ASUS routers that allows an unauthenticated attacker to run arbitrary command on the device. According to the expert, […]
Hackers hit ATM systems forcing them to dispense the cash stored in their money cases relying on certain commands sent through a smartphone. Cybercriminals can hack ATM systems and force it to dispense the cash using a smartphone, in the specific case a Samsung Galaxy 4 phone. The model of smartphone is not important, the […]
The Carnegie Mellon University CERT/CC warned about the presence of serious vulnerabilities in the Unified Extensible Firmware Interface (UEFI). The CERT/CC has issued three different advisories for security flaws identified in the Unified Extensible Firmware Interface (UEFI). The Unified Extensible Firmware Interface (UEFI) (pronounced as an initialism U-E-F-I or like “unify” without the n) is a specification that defines a software interface between an operating […]
Apple has patched the iCloud flaw exploited by iDict tool, the news was confirmed by the author of the hacking application via Twitter. Last week the iDict hacking tool has been released by a hacker known as Pr0x13, the expert posted the code of iDict on GitHub explaining that it is very easy to use and exploits a […]
A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users of WPA networks. The Greek security expert George Chatzisofroniou has developed WiFiPhisher, a WiFi social engineering tool that allows an attacker to steal credentials from users of secure WiFi networks. WiFiPhisher is available for download on the software […]
A security researcher has presented a technique dubbed Thunderstrike hack to infect Apple’s Mac PCs with with EFI Bootkit through the Thunderbolt port. Infect Apple Mac PCs exploiting the Thunderbolt port is possible, the security researcher Trammell Hudson has demonstrated how it is possible during the last edition of the annual Chaos Computer Congress in Hamburg, Germany. The […]
Many gamers are finding purchases that they never made their accounts for Electronic Arts Origin service. Once again the gaming industry under attack. There is no peace for the companies operating in the gaming industry. During Christmas holidays, the hackers of Lizard Squad brought down the PSN and Xbox live services, while yesterday the hacking […]
The hacking team H4LT has leaked Xbox One SDK online that could let experts to develop their own Homebrew Apps and run them on the popular gaming console. The gaming industry is in full storm after the massive outage of PSN and Xbox live at Christmas caused by the Lizard Squad. This time is the leakage online of […]
iDict is the a hacking tool that was published on GitHub and that can break into any iCloud account running an Apple ID Dictionary attack. A hacker has released a tool called iDict that he sustains that could be used to break into any iCloud account. According to the expert, iDict implements an exploit that is able […]
A member of the Lizard Squad hacking group that shutdown the Play Station Network and the Xbox live service networks has been arrested by the UK police. In these days, we have followed the news related to hacking team known as the Lizard Squad who became famous for having ruined Christmas for millions of users of PSN […]