Browsing tag

Vulnerabilities

The Data Breach Hits Marriott Hotels Group Exposes 5 Million Guest Details

Late last year, we have featured here in Hackercombat.com the story about Marriot International Hotel chain data breach and the resulting accusation against China allegedly being the one behind the attack, which Beijing denied. Seems like the story continues to thicken, as the hotel chain’s leadership itself admitted that around 5 million passport records have […]

Vulnerabilities in automobiles affect their resale price

Many owners of software-faulted vehicles claim that these errors represent a decrease in their value According to cybersecurity and ethical hacking specialists from the International Institute of Cyber Security, a collective lawsuit has been filed against Fiat Chrysler Automobiles (FCA). The plaintiffs claim that the company was aware of some cybersecurity gaps present in their […]

#PrinterHack2: Hackers attack again and compromise 100k printers

The attackers claim that this time they have compromised hundreds of thousands of devices around the world, in what they themselves called #PrinterHack2 A few days ago, specialists in digital forensics from the International Institute of Cyber Security reported the sudden emergence of a message supporting PiewDiePie, famous YouTuber, in thousands of printers worldwide for […]

This New Bug Is Exploiting A Security Flaw in ‘Nearly All’ PCs And Macs

A research report published by F-Secure has unearthed a new flaw that makes most of the devices including those that are equipped with disk encryption vulnerable to an attack that could steal personal data within minutes. As reported by ZDNet, F-Secure’s findings say that contemporary security measures are enough to prevent the theft caused by […]

UK Based Firm EE Hit by Two Security Vulnerabilities

As revealed by Tech Crunch, the UK-based telecommunication firm EE, endured recurrent flaws in its online system. In one week, EE fixed two security vulnerabilities that could potentially impact their customers. In the first instance, EE fixed a bug that let a customer add free unlimited data to their account’s data plan. Using any man-in-the-middle […]

New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home lighting and other traditionally non-Internet connected devices becoming Internet-citizens and people started accepting such reality without much resistance. Unlike the mature PC and the smartphone […]

Checkpoint Research Released Video Demo of a Nasty WhatsApp flaw

WhatsApp, the $19.3 billion mobile instant messaging platform acquisition of Facebook four years ago in 2014, has finally acknowledged the critical bug in its “Quote” function. It is a bug which enables attackers to use a fake WhatsApp app to edit the previous message from contacts and pretends to be that contact to other users. […]

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the IT security team failed to consider and discover. Enterprise networks store a lot of confidential and private business data that they can’t afford to lose. […]

These Vacuum Cleaner Vulnerabilities Are The New IoT Nightmare

Cybersecurity researchers have detected a couple of vulnerabilities in an IoT vacuum cleaner lineup that could let hackers spy on the victims, perform video surveillance, and even steal their sensitive personal data—all without ever turning it on. Leonid Krolle and Georgy Zaytsev, two researchers at Positive Technologies, have uncovered the vulnerabilities in the Dongguan Diqee […]

UK IT professionals are better at handling security vulnerabilities

A survey was conducted by Outpost24 to identify the managing of cyber-security exposure. This survey was conducted at Infosecurity and around 250 plus IT professionals were present for the event. The study found that UK organization is proactive when it comes to security compared to their US counterparts. Most of the organizations in the UK run security […]

Vulnerabilities in PGP and SMIME Will Leak Emails in Plain Text

Pretty Good Privacy (PGP) and S/MIME Email encryption are affecting the users and it has been found that a new set of vulnerabilities is affecting the users. This encryption is widely used for security and transmits data over the network PGP and S/MIME Email encryption is the widely used standard that developed to securely transmit the […]

Exploit Pack V10.07 Released with More than 38.000+ Exploits Including Zero-Days

Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires understanding and expertise. It contains over 38000+ exploits together with zero-days and it supports all the operating systems as targets including Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and […]

Abbott Releases Firmware Upgrade to Fix Vulnerabilities

Abbott, the leading manufacturer of medical devices, releases a firmware upgrade that would fix cyber security vulnerabilities in certain cardiac devices. Health Data Management reports- “Medical device manufacturer Abbott has released a firmware upgrade to fix cybersecurity vulnerabilities in certain radio frequency-enabled implantable cardioverter defibrillators and cardiac resynchronization therapy defibrillators.” The FDA ( Food and […]

Over Four Million Vulnerabilities Detected by GitHub Security

GitHub security alerts significantly reduced the time it takes for developers to remove vulnerabilities from their Ruby and JavaScript projects, says GitHub. GitHub’s security alerts notify repository admins when library vulnerabilities from the Common Vulnerabilities and Exposures (CVEs) list are detected in their repositories. CVE is a list of entries—each containing identification number, a description, […]

Cyber Attacks Turning Biggest Risk to Businesses and Brands: Report

As per a recent study report, cyber attacks are now becoming the No. 1 risk to businesses, brands, operations and financials. It’s the SonicWall “2018 Cyber Threat Report” that has come up with these inferences. The report finds that cyber attacks are now becoming the No. 1 risk to business, brands, operations and financials. The […]

Attackers Exploit Tinder Vulnerability Using Phone Number

A Tinder user’s phone number- that’s all that a hacker could need, to take over the account itself, as per recent reports on a newly detected Tinder vulnerability. Anyhow, it’s reported that the issues have been plugged promptly… Indian security engineer Anand Prakash, the founder of the cyber security firm AppSecure, has detected this vulnerability […]

HackerCombat Guide on How to Prevent Phishing Attacks

Phishing attacks are now very common; every one who uses the internet comes across phishing emails almost daily and it seems that most of us have now trained ourselves to identify phishing emails. But have we really turned that clever? Doesn’t it seem, from all the successful phishing attacks that happen against individuals and organizations, […]

2017 Saw Software Vulnerabilities Increase by 31 Percent

Reports say that there has been a 31 percent increase in the number of software vulnerabilities in 2017 compared to 2016 and also that one-third of these have public exploits as well. Leading vulnerability intelligence firm Risk Based Security, Inc., which has recently published its Year End Vulnerability Quick View Report for 2017, has found […]

The Likely Technology Trends in 2018

The Elon Musk’s giant solar battery in South Australia comes in as an exciting technology, and this was followed by the most awaited iPhone X. Now let’s see what we have in 2018. We have sorted six key technology trends that are making waves in Australia, which is said to be on high with productivity, efficiencies, […]

Web Site Security and Marketers Should be Cautious.

Edward Roberts, Director of Product Marketing at Distil Networks, says “Many marketers assume website security is not their problem. However, as the stewards of their organization’s external brand, marketers must understand how the brand is impacted by activity on the website. This includes malicious bot traffic that could deteriorate the user experience and skew analytics”. The article as quoted […]