Browsing category

Data Security

Possible Encryption Backdoor Discovered in Socat Networking Utility

Backdoor code was committed by a former Oracle employee. Developers of Socat, a *NIX-based networking utility, have discovered and patched a security bug affecting its encryption capabilities and that weakened the tool enough to allow attackers to downgrade and break encrypted data streams. Socat is a command-line utility for *NIX-based operating systems that enables developers to […]

USBDriveby: A Necklace That Can Hack Your PC In Just 60 Seconds

Short Bytes: In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown which is capable of doing some really dangerous hacking tricks with a horrifying outcome. This necklace is called USBDriveby, which is a necklace that can hijack your computer in just 60 seconds. USBdriveby […]

Series of Security Bugs Force Malwarebytes to Start Bug Bounty Program

Good news for security researchers you can now earn some good money by reporting security bugs to Malwarebytes — Thanks to its bug bounty program. Malwarebytes is currently in the final stages of installing permanent patches for fixing the array of security bugs in one of its flagship products. The company received reports about the […]

DMA Locker: New Ransomware, But No Reason To Panic

DMA Locker is another ransomware that appeared at the beginning of this year. For now it has been observed to be active only on a small scale (source) – but we just want to warn you that it exists. And don’t even think to pay the ransom, because its encryption is far weaker than the […]

Wikileaks’ Julian Assange could be a free man this Friday, Thanks to UN

Wikileaks founder Julain Assange can be a free man this Friday — His fate depends on the decision from United Nation’s Working Group on Arbitrary Detention (WGAD). Julian Assange, Wikileaks founder could be a free man on Friday, February 5th if the United Nation’s Working Group on Arbitrary Detention (WGAD) find Assange’s detention is unlawful. The breaking […]

Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers

A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively, according to a sanitized version of a secret federal audit. The National Cybersecurity Protection System (NCPS), also known as EINSTEIN, is a firewall run by the Department of Homeland Security. It’s goal: […]

Your HP Printer’s Hard Drive Can Be Used by Hackers To Host Malicious Files

Security researcher Chris Vickery has discovered that hackers can abuse HP LaserJet Printers and host malicious files on their hard drive. The famous security researcher Chris Vickery is known for discovering 191 million US voter registration records online. He is the same guy who found 3.3 million hacked Hello Kitty accounts — That’s not all, he also found 13 […]

JSPatch hot patching technique puts iOS users at risk

Security experts at FireEye are warning attackers can exploit the JSPatch hot patching technique to serve malicious code and put iOS users at risk. The release of hot patches for apps already deployed in the official App Store is a time-consuming procedure that results frustrating for developers. Apple is aware of this drawback, for this reason […]

Are Hackers Keeping a Hidden Stash on Your HP Printer’s Hard Drive?

Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused as an anonymous data storage unit by malicious actors, thanks mainly to a default setting that sets up an FTP server via port 9100. The feature in question has its place in HP’s […]

WhatsApp To Get End-To-End Encryption And Facebook Integration Soon

WhatsApp is working on making your chats more secure by introducing end-to-end encryption along with a much deeper Facebook integration. A developer by the name of Javier Santos shared a few screenshots on Google Plus that adheres to the changes mentioned above. When we connect the dots, WhatsApp’s co-founder Jan Koum spoke of adding end-to-end […]

Certain MediaTek phones contain a dangerous debug backdoor

MediaTek may not be on the short list of SoC companies whose chips you seek out when buying a new phone, but the company’s latest components have delivered some solid performance for their price, and it’s felt like the company’s status has been on the rise. Unfortunately, a new discovery casts a shadow over all […]

Tor Announces Official Release of Tor Browser 5.5 With New Features

Short Bytes: Tor Browser 5.5 is the first stable release in the 5.5 series of Tor. It is released for all the supported operating systems, including GNU/Linux, Mac OS X and Microsoft Windows. It is now available for download from the Tor Browser Project page along with many new features. The recent Tor Browser 5.5 release […]

Facebook Patches Critical XSS Bug That Led to Total Account Compromise

Facebook patched the issue in about six hours. British security researcher Jack Whitton has identified a critical XSS (cross-site scripting) vulnerability on Facebook that could be leveraged via malicious PNG images and grant an attacker access to someone’s account. Mr. Whitton discovered that he could use steganography to craft a malicious PNG image which would hold […]

Sydney Data Center Targeted By FinFisher Spyware

In 2013, the Australian government was accused of spying on Indonesia thanks to the documents leaked by Edward Snowden. Now, it looks like the Indonesians are taking revenge from the kangaroos. Sydney has suddenly become the center of attention of all security experts since traces of the sophisticated software suite FinFisher, which is sold to government […]

BackBox Linux 4.5 OS comes with pre-installed new hacking tools

New Hacking Tools To Come Preinstalled With BackBox Linux 4.5 Security-Oriented OS. The release of BackBox Linux 4.5 has been announced by the developers of the BackBox Linux operating system, which assures to bring a new kernel and lots of upgraded packages, plus it is also immediately available for download. As far as the overall […]

SHAREit for Windows and Android Vulnerabilities

Lenovo Security Advisory: LEN-4058Potential Impact: Remote browsing of file system, unauthorized access of transferred files and denial of service attack that could crash the Windows SHAREit clientSeverity: MediumSummary: Vulnerabilities were identified on the Windows and Android versions of the SHAREit application that may allow remote browsing of a file system and unauthorized access of transferred files by an […]