Zimperium firm released the Android Stagefright Exploit Code, the Android flaw that is threatening the users of the popular Google mobile OS. Experts at Zimperium Mobile Security Labs (zLabs) recently discovered a critical flaw, dubbed Stagefright affecting the Android OS. The experts revealed that the Stagefright flaw (CVE-2015-1538) potentially affects 95% of Android devices running version 2.2 to 5.1 of […]
Apple announced the secure iOS 9 but a popular hacker demonstrated the untethered iOS 9 Jailbreak in a video PoC before its release. Apple announced new security enhancements for its new operating system iOS 9. The new version of the Apple OS, iOS 9, will be available from September 16th on the iPhone, iPad and iPod, according the […]
Ashley Madison – A group of hackers which calls itself CynoSure Prime has cracked more than 11 Million hashed passwords protected with Bcrypt. How? Last month hackers breached the popular adultery website Ashley Madison and leaked online a dump containing data belonging to 37 Million users, including 37 Million of encrypted password. News of the day is […]
Another cyber attack hit computer systems at the Pentagon, this time the food court computers have been hacked exposing employees’ bank information. In August, alleged Russian hackers have hacked an unclassified emailing server of the Pentagon, it was just one of the numerous attacks against the US Government systems. According to the NBC news, US […]
FireEye suspects that the North Korea is responsible for a number of attacks against the South Korea relying a 0day in the South most popular Word processor. Security experts from FireEye speculate that The North Korea has carried out cyber attacks against entities of the South Korea by exploiting a zero-day ( CVE-2015-6585) in a […]
Security experts at Kaspersky Lab published a report on the Turla APT revealing the use Satellite links to control its botnet. According to a new analysis published by the experts at Kaspersky Lab reported that the popular Turla APT group exploited poorly secured satellite infrastructure to hide command-and-control operations. Turla APT was active in the last decade, […]
The security researcher and scientist Jonathan Petit claims to be able to hack a driveless-cars by using a simple Laser and a Raspberry Pi. Driverless-cars are the final goal of the principal car manufacturers that are working on several projects to introduce this new revolution in the automotive. Lexus, Mercedes and Audi are just some […]
Security experts at Paloalto Networks have uncovered a multiyear espionage campaign dubbed Musical Chairs Involving New Variant of Gh0st RAT Malware. The Gh0st RAT malware is a popular remote administration tool (RAT) created in China in the early 2000s that was used in a number of cyber espionage operations. Targeted espionage operations on Tibetan activists, including the Operation Night Dragon and the GhostNet attacks, […]
A number of recent discoveries suggest as more HTTPs websites, chat applicationss, and other services online are actualizing perfect forward secrecy. As per a Red Hat (a Linux distributor) security specialist, system equipment sold by few makers neglected to appropriately execute a broadly utilized cryptographic standard, an information releasing weakness that can permit spammers to […]
Security experts at Check Point security discovered a flaw in WhatsApp Web that could be exploited by attackers to compromise hundreds of millions users, According to the security firm Check Point a vulnerability in the popular messaging service WhatsApp Web exposes up to 200 million of its users at risk of cyber attack. WhatsApp Web allows […]