Research finds critical out-of-the-box vulnerabilities on big name laptops

Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, and agree to some exciting 30 day antivirus trials, it’s pretty forgivable to want to throw your brand new computer through the nearest window. Today, Duo […]

Israeli researchers poke holes in Samsung KNOX security system

The serious vulnerabilities impact Samsung’s Knox security sandbox. A number of severe problems have been discovered within the Samsung Knox security system in Android smartphones. Three vulnerabilities affecting Android devices running Samsung’s Knox security feature were recently revealed in a paper presented by Uri Kanonov and Avishai Wool, researchers from Tel Aviv University. The security flaws […]

Researchers Validate Link Between Cancer and Cellphone Radiations

The National Toxicology Program (NTP) carried out a US $25million study, which spanned over 2.5 years. Now, we have gotten to know the findings of this study and these are indeed startling! The study was centered (Pdf) on the role of cellphone radiations in encouraging cancerous cells within humans. The study identified that there is a […]

Revolutionary Tech from MIT Researchers: Skin Cream Remove Wrinkles Instantly

This Miraculous Skin Cream can Remove Wrinkles Instantly Reducing wrinkles and preventing the signs of aging from affecting our youthful appearance and self-confidence is everyone’s dream. In fact, almost 99% cosmetic firms around the globe strive to introduce the best possible wrinkle removal cream and treatment options to get the attention of larger chunk of […]

Researcher finds Mexico’s entire voter database (93.4 million) online

Someone leaked entire Mexican voter data on the Internet and it was not even password protected A database containing voter data of each and every Mexican citizen was available on the Internet without any password protection. This means the records of 93.4 million Mexican voters were out there for anyone to access without any restriction […]

Hacking Tesla Model S, too much noise around a great research

Last week at the CeBIT the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible countermeasures. Last week at the CeBIT conference held in Hanover, the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible countermeasures. Unfortunately, many security professionals provided […]

Researchers Trick Radamant Ransomware C&C Server into Revealing Decryption Keys

Security researchers 2, Radamant coder 0.Researchers from InfoArmor, an Arizona-based cyber-security firm, have discovered an SQL injection flaw in the control panel of the Radamant ransomware that allows them to trick the C&C server into starting the decryption process without user interaction or without users paying the ransom. The Radamant ransomware family was first spotted […]

Internet-Connected Trucks Can Be Tracked and Hacked, Researcher Finds

Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be tracked, and even hacked, if they use insecure and improperly-configured TGUs (Telematics Gateway Units), security researcher Jose Carlos Norte claims. TGU devices, or telematics, are basically a portable 3G, 4G, GPRS, LTE, Edge, […]

The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]

IBM Researchers Hack Into A Smart Building To Highlight The Backdoors Created For Hackers

This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning that building automation systems used to power so-called “smart buildings” pose a security risk to companies. According to Gartner, devices in smart homes and smart commercial buildings represented 45 percent of total connected […]

Tor Project patches critical XSS bug in its blog after researcher publicly discloses it

Tor Project patches critical bug but refuses to acknowledge the bug discovery by a security researcher. Tor Project’s website had a critical cross-site scripting (XSS) vulnerability which if exploited by a potential hacker, could have put thousands of visitors to the blog at risk. The vulnerability was discovered by an independent cyber security researcher Roy Jansen. Roy, […]

Researchers spotted a new OS X scareware campaign

Experts at the SANS Technology Institute spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers. Johannes Ullrich, security expert at the SANS Technology Institute, spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers to trick users into downloading malicious software. The expert discovered the malicious campaign while analyzing […]

Researchers Found 60+ Malware Infected Android Gaming Apps on Play Store

For cybercriminals developing an Android malware is a piece of cake and the problem is Google just not care.  According to Dr.Web’s security researchers, Google’s official Play Store is extremely unreliable because over 60 Android games available on this platform contain Android.Xiny, a malicious Trojan. It was also discovered that around 30 different developers were responsible for […]

Radamant Ransomware Author Has a Fit When Researcher Cracks His Encryption

Radamant ransomware v1 and v2 are now decryptable. Fabian Wosar, security researcher at Emsisoft, has managed to crack the encryption algorithm for the first two versions of the Radamant Ransomware Kit, and its creator was not happy at all with his actions. The first version of the ransomware which encrypted files with the .RDM extension was […]

Researcher Finds 191 Million US Voter Registration Records Online

Chris Vickery, a security researcher who is known for finding leaked databases online claims he has found US voter registration records of 191 million US voters — It is unclear who is behind the leak, why the data was leaked, if the leak is a result of a security or a human error. Vickery in the […]

Instagram Hacked: Security Researcher Gets Admin Panel Access

Wesley Wineberg, an independent security researcher, participating in Facebook’s bug bounty program, managed to crack his way through Instagram defenses and almost get complete control over the service. Soon after the researcher disclosed the vulnerability to Facebook, the company threatened to sue, instead of paying the reward he was due for his work. Mr. Wineberg started […]

Researcher Hacks Instagram, Gets Backend Access

Facebook doesn’t appreciate the effort, threatens to sue. Wesley Wineberg, an independent security researcher, participating in Facebook’s bug bounty program, managed to crack his way through Instagram defenses and almost get complete control over the service. Soon after the researcher disclosed the vulnerability to Facebook, the company threatened to sue, instead of paying the reward he […]

Researcher Threatened with Infection For Exposing Flaw in HIV Dating App

Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive people threatens the security researchers with HIV infection if they notify the company about any security bug in their app. Hzone, an application for HIV-positive singles that has over 4900 users were told […]

MacKeeper Hacked: Researcher Finds 13 Million Credentials Online

ShortRead: MacKeeper, a utility software suite for Mac OS X faced a data breach which has exposed details in relation to its 13 million customers. The most interesting part of this breach is that the guy who reported this breach doesn’t even have a Mac and found this on Shodan which is a search engine […]