A hacker Thursday afternoon published what he claims to be the decryption key for Apple iOSâ Secure Enclave Processor (SEP) firmware. The Apple Secure Enclave is an ARM-based coprocessor that enhances iOS security, but on Thursday a hacker published what he says is the decryption key for Apple iOSâ Secure Enclave Processor (SEP) firmware. According […]
Experts spotted a new signed Mac adware dubbed MUGHTHESEC that hijacks victim’s browser for profit and can be removed only reinstalling the OS. According to the expert Patrick Wardle, Director of Research at Synack, a new strain of Mac adware is threatening Mac users, once infected a machine the only way to remove it is to reinstall […]
In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China. The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka Golden Shield project). The Golden Shield project […]
Wikileaks released a new lot of documents belonging to the Vault7 dump that details the CIA project codenamed ‘Pandemic implant’ Wikileaks released a new batch of documents belonging to the Vault7 archive related to the CIA project codenamed ‘Pandemic.’ RELEASE: CIA 'Pandemic' Windows infection malware documentation #Vault7 https://t.co/YfxAKT1pog pic.twitter.com/HhmmvUBupi — WikiLeaks (@wikileaks) June 1, 2017 The Pandemic […]
Wikileaks released the documentation for the Athena Spyware, a malware that could infect and remote control almost any Windows machine. Last Friday, Wikileaks released the documentation for AfterMidnight and Assassin malware platforms, today the organization leaked a new batch of the CIA Vault 7 dump that includes the documentation related to a spyware framework dubbed Athena /Hera. The […]
Apple has recently fixed an iCloud Keychain vulnerability that could have been exploited by hackers to steal sensitive data from iCloud users. The flaw allowed hackers to run man-in-the-middle (MitM) attacks to obtain sensitive user information (i.e. names, passwords, credit card data, and Wi-Fi network information). The researcher Alex Radocea of Longterm Security discovered in […]
Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM attacks on the application. The update released Apple for the Apple Music application for Android fixes a certificate validation issue that can be exploited by an attacker to run MitM attacks and intercept user data. […]
A critical flaw could be exploited by attackers within range to “execute arbitrary code on the Wi-Fi chip,” download and install last iOS 10.3.1 version. Last week, Apple released iOS 10.3, an important release of the popular operating system the fixed more than 100 bugs and implements security improvements. Apple opted to push an emergency patch update […]
Wikileaks released the second batch of CIA’s Vault 7 dump, it contains other precious documents to understand the way CIA was hacking systems worldwide. The Wikileaks Vault 7Â dump will make for a long time the headlines, the organization has just released another lot of classified documents related the hacking tools and techniques and exploit codes […]
Great news for macOS users who were infected by the FindZip macOS ransomware, Avast released a decryption tool for free. Good news for macOS users who were infected by the FindZip ransomware, now a decryption tool was released online for free. The FindZip macOS ransomware was spotted last month by researchers at ESET, it is […]