Two security researchers from Cornell Tech discovered that web URL shorteners operate in predictable way exposing sensitive data. The security researchers Vitaly Shmatikov and Martin Georgiev from Cornell Tech discovered that web URL shorteners operate in predictable way, and this could result in the disclosure of sensitive information. The duo analyzed the most popular URL shorteners, […]
Apple abandons the support for the Windows version of quicktime, everyone should follow Apple’s guidance to uninstall it to avoid attacks. It is official, Apple will no longer provide security updates for the Windows version of the popular QuickTime. It is important to uninstall the product that remains vulnerable to cyber attacks, recently experts discovered […]
Experts at Cisco Systems discovered more than 3 million vulnerable servers exposed on the Internet while scanning for the presence of JBOSS Backdoor According to Cisco Systems, more than 3 million servers exposed on the Internet are potentially open to Samsam ransomware-based attacks because they’re running vulnerable software. Attackers are targeting vulnerabilities in servers to […]
This week the former Reuters journalist Matthew Keys was sentenced to two years in prison for helping the Anonymous collective in computer hacking. Matthew Keys, a former Reuters journalist, who was convicted in October 2015 of supporting the Anonymous collective, has been sentenced to 24 months in prison for computer hacking charges. Keys has been […]
CISCO has recently issued a security update to fix a high-risk security vulnerability affecting the UCS software and exploitable with a simple HTTP poke. Cisco has recently patched a “high” risk security vulnerability (CVE-2016-1352) affecting its Unified Computing System (UCS) Central Software that could allow a remote attacker to gain remote control of the machines. […]
A couple of security experts demonstrated that iOS date bug was still present in iOS devices and it was exploitable by spoofing an Apple NTP server. Do you remember the Apple iOS date bug? In February, the security community highlighted the existence of the embarrassing problem for Apple iOS mobile devices running 64-bit iOS 8 or higher, […]
A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-end encryption to protect its users from eavesdropping, many other companies are adopting the technical improvement, but there are some circumstances that still open their customers to […]
The British Government is attempting to force the hacktivist Lauri Love to hand over his encryption keys to access data stored in his seized laptop. Lauri Love is the hacktivist accused of breaking into Government networks, now the UK NCA wants to oblige him to hand over encryption keys to equipment seized from his home. The […]
Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated in less than 10 seconds. Security researchers have analyzed the code of Petya ransomware in order to devise a method to allow victims to restore encrypted files. The experts have been able to develop a decryption tool […]
Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to Japanese companies. Sprout, the cybersecurity firm in Japan has launched BugBounty.jp (https://bugbounty.jp/), which is the first bug bounty platform in Japan designed to Japanese companies easily run bug bounty programs, and get helps from white hat hackers around the […]