The Outpost24 team has identified several vulnerabilities that affect Joomla HelpDesk Pro extension, the flaws can lead to remote code execution on servers. Kasper Bertelsen, a security researcher at Outpost24 has discovered a number of vulnerabilities in the Joomla Helpdesk Pro extension which can lead to remote code execution on servers. The Helpdesk Pro Joomla extension is developed […]
The popular hackers Charlie Miller and Chris Valasek have demonstrated how to hack a connected car remotely. Charlie Miller and Chris Valasek do not need any introduction, they are two stars of the hacking community that have alerted several times automotive industry regarding the risks related to the hack of connected cars. To demonstrate the feasibility […]
MongoDB administrators have exposed something like 595.2 terabytes of data by using bad poor configurations, or un-patched versions of the MongoDB. John Matherly, the creator of Shodan, the marvelous search engine for connected devices, revealed that many MongoDB administrators have exposed something like 595.2 terabytes of data by using bad poor configurations, or un-patched versions […]
Nearly 37 million users of the cheating site Ashley Madison are at risk of having their data leaked online, including financial info and sexual fantasies. The popular online cheating site Ashley Madison has been hacked, and a big amounts of data was stolen by hackers who posted part of this information online as proof of […]
Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a weaponized drone. Security experts are continuing to dig the leaked internal emails from the Hacking Team, last revelation is related to the development of an unmanned aerial vehicle with the ability to run cyber attacks […]
A sophisticated APT group who targeted the White House and State Department, have launched a new stealth spear phishing campaign on the Pentagon. The Daily Beast has revealed that he got the proof that the White House and State Department were hacked by a sophisticated Russian APT. The newspaper that published the news in exclusive has run […]
According to a report published by The Telegraph, scammers are targeting iPhone and iPad users with a new elaborate scheme that relies on iOS crash warnings Scammers are targeting iPhone and iPad users with a new-old elaborate scheme that relies on iOS crash warnings. Scammers are using JavaScript generated dialogs to display IOS Crash warnings, as explained […]
According to a recent research published by experts at the AppBugs firm many Android and Apple mobile apps allow brute force attacks. Android and Apple devices are the most used worldwide, millions of mobile users every day use the apps available in their official stores, but what if the majority of these applications are vulnerable […]
A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid. A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid.  Experts at Symantec in March 2014 discovered a new HTTP Android Remote administration tool, named Dendroid, available on […]
The newest RC4 attack is a nightmare for certain HTTPS implementations, almost a third of the world’s encrypted Web connections can be cracked. We have written several times about RC4 encryption that has been accused of being a Cryptographic disaster, now two Belgian security researchers from the University of Leuven did another discovery that highlights […]