A mysterious hacker is responsible for a mass Reddit defacement of 70 subreddits, he wants to demonstrate the lack of security of the popular platform. Someone is creating the panic on Reddits, a mysterious user behind the name TehBVM (@TehBVM) claims to have already popped more than 100 Reddit subreddits. The user already targeted subreddits related […]
A few days ago group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power company and breach it with Social Engineering. RedTeam Security is a group of ethical hackers who specialize in offensive security, believing that the best defense is a good offense. We wrote about […]
The Philadelphia Police Department admitted they disguised a surveillance SUV equipped with a powerful ALPR as a Google Streetview vehicle. The Philadelphia Police Department has used a track for surveillance activity by disguising it as Google Streetview vehicle. “An SUV tucked away in the shadows of the Philadelphia Convention Center’s tunnel bears the ubiquitous logo for […]
Recently security experts at Cisco Talos have discovered multiple exploitable vulnerabilities in 7-Zip that open users to cyber attacks. According to the Cisco security researcher Jaeson Schultz, multiple flaws in the 7-Zip compression tool could be exploited by hackers to gain the complete control on the target machine running the popular software. “Recently Cisco Talos has […]
With the advent of technology, terrorists have changed their strategies and converted themselves into high-tech & sophisticated groups. “While Osama Bin Laden had his fingers on the trigger, his children have their fingers on the mouse.” Intro Until now people have fought for food, water or territory, but today the definition and motivation of fighting […]
Facebook hopes to make security education easier for students with the release of its Capture the Flag platform to open source on GitHub! Are you interested in testing your hacking abilities? Facebook is offering a secure opportunity for you by opening it Capture The Flag (CTF) platform to test hacking skills in a legally safe environment […]
A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm Recorded Future have conducted an interesting study on the proof-of-concept exploits shared online (e.g. On Twitter, on forum linking to personal blogs, GitHub, or Pastebin) last year. […]
Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a company could be very easy and cheap for hackers, it could be sufficient to buy from Amazon and eBay $700 worth of parts. “We watched a […]
Lenovo fixed the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware causing major security problems for users. Lenovo has fixed a security vulnerability in the Lenovo Solution Center (LSC) support tool that could be exploited by attackers to execute code with system privileges and take over the machine. Lenovo Solution Center […]
OpenSSL has the patches for six flaws including two high-severity bugs that could allow attackers to decrypt HTTPS traffic and execute malicious code on the server. OpenSSL just released several patches to fix vulnerabilities in the open-source cryptographic library, including a couple of high-severity flaws (CVE-2016-2107, CVE-2016-2108) that could be exploited to decrypt HTTPS Traffic. The CVE-2016-2107 could […]