At RSA conference 2015 a researcher demonstrated that Avaya’s Ethernet office phones can be compromised with just a simple text editor. At the RSA conference 2015 in San Francisco, Dr Ang Cui from Columbia University PhD and Red Ballon Security cofounder announced that Avaya’s Ethernet office phones can be compromised with just a simple text […]
Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]
The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]
Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of flawed Smart city systems. My readers know very well the cyber security expert Cesar Cerrudo that is author of several interesting studies on smart city systems, in August 2014 he presented a research on vulnerabilities affecting […]
Security researcher Marcus Murray discovered a method to exploit a malicious JPEG to compromise modern Windows servers inside corporate networks. Security expert and penetration tester Marcus Murray discovered a way to use a malicious JPEG to compromise modern Windows servers and elevate privileges over targeted networks. The researcher has demonstrated the attack a few days […]
FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government entity”. Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted attack by exploiting two zero-day vulnerabilities to target an “international […]
A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers of the zero-day exploits. The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and services, despite normal people believes that drugs and […]
A report published by the Government Accountability Office (GAO) warns that the FAA faces some serious cyber security issues for modern flights. Security experts for a long time suspected that in-flight Wi-fi could create an entry door for hackers and a new report issued by The US Government Accountability Office (GAO) describes the dungeon of […]
WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the  Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks  published the […]
Security experts worldwide have discovered that threat actors are exploiting the Microsoft Zero-Day vulnerability MS15-034 in cyber attacks. Security researchers at SANS Internet Storm Center revealed that the critical remote code execution vulnerability MS15-034 affecting the Windows HTTP protocol stack is being actively exploited in the wild. The experts explained that the MS15-034 flaw affects […]