ENISA issued the ENISA Annual Incident Reports 2012 on significant incidents in the electronic communications sector, which were reported to national regulators in 2012. ENISA published the ENISA Annual Incident Reports 2012, a document that provides an overview of the process and an aggregated analysis of the 79 incident reports of severe outages of electronic […]
The Indian security expert ‘Rahul Sasi’ found a USB Internet Modems vulnerability that could allow to gain Meterpreter shell or full access to the victim just sending an SMS. The Indian Security expert ‘Rahul Sasi‘ announced to have found a USB Internet Modems vulnerability that could allow an attacker to execute malicious code remotely simply sending an SMS […]
This is the second edition of ‘The Hackers Conference’. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held in New Delhi, on the 25 of August 2013, and will […]
Security experts at Kaspersky have detected numerous Android malicious applications that uses Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging Service (GCM) as Command and Control server. The Google service allows Android app developers to send messages using JSON format to installed apps, but hackers exploited it for malicious purposes. The discovery has been made […]
Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve written on RAT for Android today we will speak of a weakness in some Android wallet apps for the popular mobile operating system that exposes Bitcoin users to risk of theft. […]
AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow the hack of Android mobile devices. AndroRAT is an open-source tool that was created and published on the Internet in November 2012, it is a RAT (Remote Access Tool) for Android OS and exactly as any other […]
Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to a vulnerability in Windows Phone OS that could allow information disclosure, the flaw is related to Wireless PEAP-MS-CHAPv2 Authentication used by Windows Phone to access to wireless network. According the Microsoft Security Advisory (2876146) a hacker exploiting […]
Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system of a water facility. The researchers deployed a honeypot to collect evidences on the attackers that […]
This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS BLOCKED ACCESS TO VIEW IT This is a Proof of Concept made by BHAVESH NAIK DO YOU WISH TO SEE WHO IS IN YOUR FRIENDS LIST, EVEN WHEN YOUR FRIEND HAS BLOCKED ACCESS TO VIEW HIS […]
Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy on suspects for investigations. The FBI is using mobile Android malware to spy on suspects for its investigations, the news is not surprising but is the confirmation that law enforcement are exploiting new technologies for […]