Microsoft Zero-day CVE-2013-3906 – Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively exploited in targeted attacks using crafted Word documents sent by email. A new zero-day vulnerability has been found a Microsoft product that could allow attackers to install a malware via infected Word documents. The Microsoft […]
The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described a typical attack scenario. Recently I read an interesting post published on the Websense security labs blog on the use of social network LinkedIn for the reconnaissance phase of an attack. The concept is not […]
Security expert Jay Freeman discovered another Master Key vulnerability in Android 4.4 that allows attackers to inject malicious code in legit apps. The flaw known as “Android Master Key vulnerability” is considered a nightmare for Android OS, last July it was discovered for the first time and experts revealed that 99% of Android devices are vulnerable. The […]
Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all, they include SQL Injection, XSS and URL Redirect. Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all following an ethical conduct. The flaw interested principal security firms and private companies, following the complete list: Invalidated URL Redirect in […]
Google Hacking is a formidable method for reconnaissance. Mass website hacking tools based on Google-dorks advantage the malicious online activities. Google hacking is a must for hackers and pen testers, the popular search engine is a mine of information for targeted analysis and reconnaissance phase. In the past we discussed on how to use Google […]
OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA that as usual will address with DDoS attack principal US Government websites. Security experts don’t exclude the […]
Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection Denial of Service technique, efficient and cost-effective. Prolexic Quarterly Global DDoS Attack Report revealed an increasing interest of cybercrime in Distributed Reflection Denial of Service technique (DNS reflection DDoS attack aka or DrDoS) and for this reason the company specialized in DDoS […]
Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The popular Ebrahim Hegazy has found another serious vulnerability in Twitter, the cyber security analyst and Consultant at Q-CERT has discovered a flaw in the social media that allows Unrestricted File Upload. When a user creates a […]
Wi-Fi HTTP Request Hijacking attack against iOS – the researchers at Skycure have demonstrated a new technique that menaces mobile users. I’m not surprised for trust given by Internet users to public Wi-Fi networks that are notoriously insecure, wrong habits on the open networks could expose our identity to serious risks, one on all the identity theft. […]
Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]