The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or less. Have you ever gone in the Gym and after a long and tiring workout forget your padlock numbers? I sure did, but next time I will not call the janitor, I will try to […]
The stricken-scum now deal with an option: work harder in order to find Java zero days or simply abandon dispatch and begin exploiting older Flash-bugs. Redmond’s security heads trust – Matt Miller, Tim Rains and David Watson – claim its patch wrecking-ball, employed only to out of the date Java installations previous year, which forced […]
WattsUpDoc is a platform developed by two researchers for the monitoring of medical devices and detection of potentially “life-threatening malware.” Two US Hospitals will start using a system that can detect malware infections of medical devices, the technique relies on a probe that monitors the AC power consumption of the units. The hospitals (name were […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 â Best of […]
The European Rail Traffic Management System is a signalling system that will control all the Britain’s trains and it could potentially be hacked. By increasing the penetration level of the technology in our ordinary life, we are increasing our surface of attack. We have discussed many times about the risks for critical infrastructure, but threat […]
Which is the impact of the Windows XP End of Life on the critical infrastructure? Recently a Government audit found 48,000 XP PCs still running at TEPCO. One year ago the end of life for Microsoft Windows XP raised a heated debate on security for all the infrastructure that still adopt the popular OS. Windows XP […]
Sucuri revealed that cyber criminals are attempting to hijack online shops based on Magento platform by exploiting a recently disclosed critical flaw. According to the security experts at Sucuri firm, within 24 hours after the disclosure of the vulnerability in Magento platform, bad actors are already attempting to hack e-commerce websites using it. The experts traced back the attacks […]
Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]
Google is improving its services, last decision it related to the Ads, the company takes a step towards by deployeng âHTTPS Everywhereâ. Another good step, coming from google involving encryption. As you may remember Google started to encrypt back in 2008, when Gmail started to use HTTPS. Since 2008, Google has done a remarkable work […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Darwin kernel, just an IP packet to cause the crash of Apple devices How far do stolen data get in the deep web after a breach? NSA dreams of […]