Researchers Release Tool That Finds Vulnerable Robots on the Internet

A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily ‘footprint’ and detect unprotected robots, not only connected to the Internet, but also to the industrial environments where they operate. Dubbed “Aztarna,” the framework has been developed by Alias Robotics, a Spanish cybersecurity firm […]

Meet Aztarna, a tool to find vulnerable Internet connected robots

The company behind Aztarna is Alias Robotics, a cyber-security startup. Manufacturers and users of IoT robots should breathe a sigh of relief that the cyber-security startup Alias Robotics has developed a robot scanning tool that can track any robot connected to the internet and powered by any robotic technology such as ROS or SROS. Dubbed Aztarna […]

5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws

A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites’ visitors at risk of hacking.Independent researcher and bug-hunter Paulos Yibelo, who shared his new research with The Hacker […]

Thousands of Internet connected hot tubs vulnerable to remote attacks

Weak security practices have rendered IoT devices vulnerable to hacking and all sorts of cyber-attacks. According to the research from a Buckinghamshire-based security group Pen Test Partners, hot tubs can also be hacked using an app simply because there isn’t any authentication process in place. Reportedly, 26,000 hot tubs are currently vulnerable to be hacked […]

Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers

Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as ‘Magellan‘ by Tencent’s Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a […]

UPnProxy – A Dubbed NSA Hacking Tool of EternalSilence Vulnerable to Attack 277,000 UPnP Enabled Routers

New research reveals that  Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking tool arsenal. UPnP is a feature that allows the devices on your network to discover each other and allow to access certain services. Often, this is used for streaming media between devices on a network. […]

5 Privacy Mistakes that Leave You Vulnerable Online

When news broke about Cambridge Analytica, the Internet went into a frenzy: “How could Facebook do this!” “Facebook should be made accountable!” Besides the fact that I think the whole Cambridge Analytica issue was blown out of proportion, I believe bigger issue is the fact that very few people are willing to be responsible for their […]

Tool to find vulnerable cameras

Using a smart combination of different tools, Kamerka can take an address, a cue point or coordinates and show exposed cameras connected to the Internet on a map Security cameras are a very common thing for the people living in the big cities. As reported by specialists in digital forensics and cybersecurity from the International Institute […]

A DHCPv6 package could compromise a vulnerable Linux system

The flaw allows remote code execution to hackers A security error in Systemd can be exploited over the network for, at best, potentially blocking a vulnerable Linux machine or, in the worst case, executing malicious code, as reported by digital forensic experts from the International Institute of Cyber Security. Therefore, the flaw puts Linux computers that work […]

Windows PCs Vulnerable To RID Hijacking; Grants Full System Access To Attackers

A security researcher named Sebastián Castro has uncovered a way of gaining admin rights and boot persistence on Windows PCs that is not only simple to execute but hard to stop as well. RID Hijacking This technique manipulates a parameter of Windows user accounts named Relative Identifier (RID). Account security identifiers (SIDs) that define a user’s permissions group, […]

Major weapon systems developed by US DoD highly vulnerable to cyber attacks

Several Critical Vulnerabilities Identified in Major Weapon Systems Being Developed by US DoD. The advanced weapon systems developed by the US Department of Defense with a whopping estimated expenditure of $1.66 trillion are plagued with grave flaws, which make them a potential target for rivals looking to disrupt or control their functions. According to the […]

Nearly 90% of routers contain vulnerable code

Five out of six brand routers such as Linksys, NETGEAR, and D-Link, contain known open-source vulnerabilities Experts in digital forensics report an exorbitant figure regarding to the use of domestic and organizational tasks routers, since 83% of these devices contain vulnerabilities that could be exploited to deploy numerous cyberattacks. Of vulnerable routers, more than a quarter contain critical and high-risk vulnerabilities, according to a report published this week […]

New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home lighting and other traditionally non-Internet connected devices becoming Internet-citizens and people started accepting such reality without much resistance. Unlike the mature PC and the smartphone […]

MacOS AirMail 3 App, Vulnerable to Email Leaks

Windows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from 1993 till 2006. It was only until the release of Windows Vista’s Mail app (Outlook Express’ successor.) when Microsoft started to pick-up a better PR for their email client’s security reputation. However, vulnerabilities […]

Windows VBScript Engine Zero-day Flaw used by Darkhotel Hackers Group To Compromise Vulnerable Systems

A new zero-day exploit for Windows VBScript Engine discovered that belongs to North Korean cyber criminals gang called Darkhotel which is the same gang behind another Zero-day flaw “double kill” that affected IE browser. This new zero-day attack spotted in July by security researchers from Trend Micro that helps to exploit the code execution vulnerability in […]

Drupal sites vulnerable to hackers because of Symfony flaw

It is recommended to install the released security patches as soon as possible Drupal, the popular open source content management system, has launched a new version of its software to fix a security bypass vulnerability that could allow a hacker to remotely take control of compromised websites, as reported by enterprise network security experts from the International Institute of […]

Are Apps Like Slack And Dropbox Actually Vulnerable To Attack?

According to a recent survey report, many big IT decision-makers see Enterprise Communication and Collaboration (EC&C ) apps like Slack, Dropbox, etc as being vulnerable to cyberattack. The survey was conducted by Israeli cybersecurity firm Perception Point and comprised five hundred respondents representing different industries. The respondents were from medium and large enterprises that had 1000-plus […]

Vehicle-sharing apps are vulnerable to hacking

Researchers specializing in enterprise data protection services have analyzed more than a dozen mobile apps provided by shared car companies and have discovered serious security gaps that can be exploited to obtain personal information and even steal vehicles. The specialists have investigated a total of 13 apps to share cars running on Android. Apps are […]

Top 10 vulnerable airports where your device can be hacked

The aviation industry is growing, thanks to millions of passengers traveling around the world. According to Statista, in 2017, 36.8 million flights were operated worldwide while the Bureau of Transportation Statistics revealed [PDF] that in 2017, U.S.-based airlines transported over 746 million passengers to and from airports across the country. For the airports, it is an opportunity to take advantage of […]