Researchers at Kaspersky Lab discovered Apple Safari browser stores previous secure session data unencrypted in a hidden folder. Appleâs Safari browser stores session information including authentication credentials used in previous HTTPS sessions to implement the feature “Reopen All Windows from Last Session”. Safari stores in a plain text XML file called Property list, or plist, […]
The German security researcher David Vieira-Kurz discovered a critical vulnerability in the Ebay website that allows an attacker a remote code execution. The German security researcher David Vieira-Kurz discovered a critical vulnerability in the official Ebay website in particular in its sub domain http://sea.ebay.com that allows an attacker a remote code execution. Itâs not the first time […]
Experts at Hacker Online Club published a post on Google vulnerabilities that are currently not under bug bounty program of the company. Today I desire to propose the information on Un-patched Google Vulnerabilities published on the web site Hackers Online Club trying to understand a hacker how could exploit them. The first Google Vulnerability is a […]
Researchers at ReVuln demonstrated how gain the control of an entire render farm exploiting the vulnerability affecting NVIDIA mental ray. Researchers at ReVuln recently published a paper that details a vulnerability affecting NVIDIA mental ray which allows an attacker to take control over a mental ray based render farm. Probably not all know what is […]
LinkedIn iOS app parses HTML in the messages, and this can be used to phish for credentials or be escalated into a full blown attack. Senior CyberSecurity Specialist Zouheir Abdallah @ZuZ  (Twitter handle), has publicly and responsibly disclosed a vulnerability in LinkedIn’s mobile app. Zouheir is known for reporting a serious vulnerability in DropBox’s 2 Factor […]
Amazon announced the use of unmanned drones for Civilian purposes, Samy Kamkar has demonstrated how to build your UAV “Killer drone” to hijack them. Amazon company, the world’s largest online retailer, has recently announced that it is testing unmanned drones to deliver products ordered by the customers, the service could take up to five years […]
Google discovered the unauthorized use of digital certificates issued by an intermediate certificate authority linked to ANSSI for several Google domains. Google has revealed that late on December 3rd it became aware of unauthorized digital certificates for several Google domains and immediately has started the investigation. Security experts at Google found that the digital certificates […]
Google has recently removed from the official Play store the ” Balloon Pop 2″ Android game that allows WhatsApp conversations snooping. Every day numerous friends ask me if it is possible to steal WhatsApp chat messages and how, of course a malware represents an excellent solution to the request. In the past I already posted […]
Two Million stolen Facebook, Twitter login credentials were found on ‘Pony Botnet’ Command and Control Server by Trustwave’s researchers. Two Million social media credentials stolen by cybercriminals have been found by security experts at Trustwave’s SpiderLabs, the collection includes popular social media like Facebook and Twitter and popular websites such as Google and Yahoo. Trustwave’s SpiderLabs […]
German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio signals. The shocking news that it is possible to infect a computer with Inaudible Audio signals is circulating within the security community has been circulating for several weeks between denials and confirmations. In October the […]