The independent researcher  Indrajeet Bhuyan has demonstrated that is possible to crash the popular messaging app Whatsapp by sending crazy smileys. Crash our Friends’ WhatsApp could be quite easy, this is what the independent researcher Indrajeet Bhuyan has demonstrated by sending crazy smileys. Nearly 4000 simple Smileys are enough to crash our friends’ WhatsApp, the trick works on both […]
The hacking crew Phantom Squad announced a severe attack on PSN and Xbox Live networks, but SkidNP group defaced its website. A few days ago a group of hackers dubbed Phantom Squad announced that it will take down the Xbox Live and PlayStation Network platforms during the upcoming Christmas holidays, emulating the clamorous attack conducted last year […]
Basically all Dutch citizens who own a mobile phone are at risk of attack due to poor security practices at the Phone House. The  freelance IT security consultant Sijmen Ruwhof discovered that personal info of more than 12 million Dutch mobile phone are open to cyber attacks. Ruwhof  detailed all the security issues he noticed in a […]
The popular expert and Shodan creator John Matherly found over 650 terabytes of MongoDB data exposed on the Internet by vulnerable databases. Last week my old hosting provider GoDaddy created me a lot of problems so I had no opportunity to write about this interesting story, now I passed to a better provider and I […]
The researcher who hacked Instagram claims he was threatened by Facebook after he responsibly reported a series of security issues. Every platform is potentially hackable, even the armored Facebook and Instagram and the independent security researcher Wesley Weinberg has demonstrated it. Of course, if the hackers ethically report the flaw to the company usually nothing happen, but the […]
Playstation network and Xbox Live risk to be taken down on Christmas by an anonymous group of hackers known as the Phantom Squad. If you remember, last Christmas, both PlayStation network and Xbox Live were took down by hackers belonging to the group of hackers known as Lizard Squad. It looks like this year this […]
The researchers Hector Marco and Ismael Ripoll have found that the Grub2 authentication could be easily defeated by hitting backspace 28 times. A couple of researchers from the University of Valencia’s Cybersecurity research group, Hector Marco and Ismael Ripoll, have found that the Grub2Â bootloader is plagued by a serious vulnerability that can be exploited by […]
The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in which the nodes and edges have statistics such as counts, histograms and sketches.”, its code is available for download on the code-sharing website Github. “Gaffer is […]
The websites based on the popular Joomla CMS need to be updated as soon as possible due to a critical remote code execution vulnerability. The websites based on the popular Joomla CMS need to be updated as soon as possible, Joomla has just released a security patch to fix a critical eight-year-old remote code execution vulnerability. […]
Security experts at the Google Project Zero team have discovered a critical flaw in FireEye appliances that could be exploited via email. A remote code execution vulnerability dubbed “666” affect FireEye Appliances, hackers can exploit the flaw simply by sending an email or tricking users into clicking on a link. The 666 vulnerability resided in […]