The Indian security expert ‘Rahul Sasi’ found a USB Internet Modems vulnerability that could allow to gain Meterpreter shell or  full access to the victim just sending an SMS. The Indian Security expert ‘Rahul Sasi‘ announced to have found a USB Internet Modems vulnerability that could allow an attacker to execute malicious code remotely simply sending an SMS […]
This is the second edition of ‘The Hackers Conference’. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held in New Delhi, on the 25 of August 2013, and will […]
FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times. A new series of cyber attacks conducted by Chinese hackers targeted the US media, it seems that the responsible is […]
A study titled âIran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country. The news doesnât surprise the cybersecurity experts that know very […]
Cybercriminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware. DNS impairment or rather compromising DNS to distribute malicious code, cyber criminals are very attracted by the possibility to use DNS servers to redirect users that trying to visit a legitimate domain are hijacked […]
The Security researcher Dan Melamed has found two new Facebook vulnerabilities related to the Fanpage Invite of the popular social network. Security researcher Dan Melamed has found 2 new Facebook vulnerabilities that has been recently patched and that I decided to shows you to understand the infinite possibilities an attacker have to hit also a robust platform […]
Security Researcher Mohamed Osman Saeed has found a long series of critical vulnerabilities in major websites but he could not participate to any bounty program because he lives in the sanction country ÂSudan. Security Researcher Mohamed Osman Saeed has found a long series of vulnerabilities in major websites. He declared to have found an XSS flaw in 2 IBM Site’s ( […]
Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system of a water facility. The researchers deployed a honeypot to collect evidences on the attackers that […]
This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS BLOCKED ACCESS TO VIEW IT This is a Proof of Concept made by BHAVESH NAIK DO YOU WISH TO SEE WHO IS IN YOUR FRIENDS LIST, EVEN WHEN YOUR FRIEND HAS BLOCKED ACCESS TO VIEW HIS […]
The HTTPS cryptographic scheme is menaced by the BREACH attack that allows hackers to capture security credentials, email addresses and much more from encrypted pages, often in as little as 30 seconds. Breach (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is the name of an new methods to capture login tokens, session ID […]