Researchers Send Secure Passwords Using the Human Body

Sending passwords through an Internet connection or Bluetooth is not safe anymore so these researchers have developed a technology that sends passwords through nothing else but the human body. Researchers at the University of Washington have finally figured out a way to use a human body to transmit sensitive information such as your passwords and other […]

Crypto needs more transparency, researchers warn

Publish primes with seeds, so we know there are no backdoors. Researchers with at the French Institute for Research in Computer Science and Automation (INRIA) and the University of Pennsylvania have called for security standards-setters to publish the seeds for the prime numbers on which their standards rely. The boffins also demonstrated again that 1,024-bit primes […]

Confirmed! Researchers Are Close To Creating A Hack-Proof Code

Short Bytes: More and more things are getting connected to the internet. Apart from its advantages, it also raises a concern regarding these things becoming prone to hackers. A DARPA-led project HACMS is aimed at developing the formal verification technology. The software is designed in accordance with the formal specifications that make them hack-proof. The […]

Car Hacking Research: Remote Attack Tesla Motors

With several months of in-depth research on Tesla Cars, we have discovered multiple security vulnerabilities and successfully implemented remote, aka none physical contact, control on Tesla Model S in both Parking and Driving Mode. It is worth to note that we used an unmodified car with latest firmware to demonstrate the attack. Following the global […]

FACEBOOK FIXES VULNERABILITY THAT LED TO ACCOUNT TAKEOVER, PAYS RESEARCHER $16K

Facebook quickly resolved a vulnerability in its Business Manager tool late last month that could have let an attacker take over any Facebook page. Arun Sureshkumar, a security researcher in India, disclosed the vulnerability Aug. 29; a member of Facebook’s security team, Neal Poole, informed him the following day it had been fixed. Related Posts Sureshkumar, a student at […]

Malware Authors Rename Ransomware After Emsisoft’ Security Researcher

His name is Fabian Wosar and he is a Ransomware Decrypter from Emsisoft, known for being an expert in his job. However, Wosar is in the news for all the wrong reasons nowadays because Apocalypse malware developers are trying to sabotage the security researcher’s reputation. Reportedly, the developers of a series of ransomware called Apocalypse have […]

Researchers Use Wi-Fi Signals to Sniff Keystrokes

New WiKey attack can compromise passwords via WiFi signals. It is theoretically possible to accurately detect keystrokes using the Wi-Fi signals from a plain router, scientists from Michigan State University and the Nanjing University in China have discovered. Researchers say that, in environments with minimal signal interference, an attacker could use the disruptions in the router’s […]

WikiLeaks Turkish AKP Email Dumps Contain Malware; Researcher

Last month Wikileaks published emails stolen from Turkish ruling party AKP — Now, a researcher has presented a report showing the AKP emails contain malware attachments! A security researcher, Vesselin Bontchev, claims to have found malware in several downloadable files in the leaked data dump published by WikiLeaks from the Turkish ruling party (AKP) server. […]

Your Linux Distro Can Be Hacked In 60 Seconds Due To Serious TCP Flaw: Research

Short Bytes: Researchers have found a critical flaw that affects all Linux kernel version 3.6 and beyond. If left unnoticed, this flaw allows a range of harmful blind off-path TCP attacks that can compromise the security of a Linux user with a success rate of 90%. The researchers have proposed certain changes and implementation of a […]

Security Researcher found vulnerabilities on the HP Website

The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of code review to mitigate the risk of this failure and prevent future attacks. “I would like to make it clear, I am writing this report for educational purpose, I contacted HP Security-Team that […]

Researchers Hide Malware Inside Digitally-Signed Files Without Breaking Hashes

New technique makes malware detection almost impossible. A team of security researchers from Deep Instinct have discovered a method of injecting malware inside a digitally-signed binary without affecting the overall file hash, which almost certainly ensures that antivirus and security software won’t detect the malicious file. When users double-click an executable and launch it into execution, […]

Researchers crack open unusually advanced malware that hid for 5 years

Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in its design and execution that it could probably have been developed only with the active support of a nation state. The malware—known alternatively as “ProjectSauron” by researchers from Kaspersky Lab and “Remsec” by […]

Researchers Put Together PHP Zero-Day in Order to Hack PornHub

PHP project fixes issues affecting all PHP versions 5.3+ A team of three researchers went so far as to search and discover a PHP zero-day so they could hack PornHub as part of its official bug bounty program. The path the three took to hack PornHub is something not usually seen in regular security research. Because […]

Researchers Hack Their Way into Punkey PoS Malware Backend

Criminals infected over 200 US businesses with PunkeyPOS. Security researchers from PandaLabs have hacked their way into the administration panel of the PunkeyPOS point-of-sale malware and have discovered an ongoing campaign targeting stores in the US. PunkeyPOS, or Punkey, is point-of-sale malware that first appeared in April 2015 from an older version of the NewPoSThings PoS […]

Russian government hackers penetrated DNC, stole opposition research on Trump

Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach. The intruders so thoroughly compromised the DNC’s system that they also were able to read […]

MITSUBISHI HYBRID SUV HACK PUTS DRIVERS AT RISK, SAYS RESEARCHER

Security experts are warning owners of Mitsubishi Outlander Plug-In Hybrid Electric Vehicle that their cars can be hacked via the automobile’s on-board WiFi network used for remote control of key car features. The hybrid electronic vehicle, which is slated to be sold here in the U.S. starting this fall, suffers from weak password requirements that […]

Researchers show how to steal data through PC components without hacking

No hacking required, as these Israeli researchers demonstrate how to steal data through PC components. A series of side-channel-attacks that can steal encryption keys by watching acoustic, electric, and electromagnetic signals generated by a PC have been developed by a team of computer science researchers from the Israel Institute of Technology (also known as the […]