Google security team has recently discovered and blocked fraudulent digital certificates issued for several Google domains by a Chinese CA. On March 20, Google security team has discovered and blocked fraudulent digital certificates issued for several Google domains. The investigation revealed that a Chinese certificate authority was using an intermediate CA, MCS Holdings, that issued the bogus […]
Thousands of routers exposed on the Internet by the ISPs are vulnerable to hacking and consequence of attacks on a large scale could be dramatic. ISPs have provided at least 700,000 ADSL routers to the public and unfortunately these kinds of routers have been really vulnerable to every possible hacker who wants to gain the […]
Security experts discovered that the Adobe CVE-2011-2461 vulnerability is exploitable by at least four years despite the company has issued a patch. Four years ago Adobe released a patch for the vulnerability CVE-2011-2461 that was affecting the Adobe Flex SDK 3.x and 4.x. The flaw was a cross-site scripting (XSS) vulnerability that allowed remote attackers to inject arbitrary […]
Chris Watts discovered a security flaw affecting some models of Cisco IP Phones that could be exploited to eavesdrop on conversations and make phone calls. Some models of Cisco IP phones for small businesses are affected by a vulnerability, coded as CVE-2015-0670 that could be exploited by a remote attacker to eavesdrop on conversations and make phone calls […]
A cell of the ISIS has called on its members and backers in the US to kill 100 service members whose names, photos and addresses it posted online. The ISIS continues to scare the West, its operations are supported by a very aggressive media campaign that shares proclamations and recruit new followers in the name […]
Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. âFindings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to […]
The SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. In the last months, many readers contacted me for a newsletter so I decided to launch the service that will be start tomorrow. Subscribing the newsletter, you will receive every week a list of […]
Qualys announced the availability of free assessment SSL Labs APIs and a tool that could be used by users to automate SSL vulnerability testing for websites. The Qualys security firm recently created the Qualys SSL Labs that provided a free tool to conduct free assessment by using its APIs and a new tool that enable SSL […]
For the first time China has publicly admitted the existence in its military organization of special information warfare units. Since quite some time that security experts sustain that China has one of the most advanced cyber army that is responsible for carried some of the highest profile cyber-attacks, but the Government of Beijing China always […]
Security researchers developed a new BIOS bootkit that exploit recently discovered vulnerabilities. The experts will present their study to the CanSecWest. BIOS bootkits are a reality despite there is little evidence of BIOS implants in the wild. The BIOS bootkits was mentioned when Snowden disclosed the catalog of surveillance tools used by the NSA ANT division, these malicious malware are […]