Trojan Android Apps Create an SMS Botnet
With the increase of Android based devices within the mobile phone market in recent years, it seems that some hackers are warming to the idea of creating more advanced malware targeted at android...
View ArticleWindows XP vulnerable to a new Internet explorer exploit
UPDATE 8th JAN - Security researchers with Exodus intelligence have since reported a bypass for the Microsoft Fixit solution mentioned below. It should be noted that the exploit to counter Microsoft’s...
View ArticleYahoo Mail Vulnerable to XSS Exploit / SSL Made Available to Users
With over 200 Million estimated users, Yahoo mail competes with the likes of Google Mail and hotmail and has become one of the largest webmail providers to date. A video has been posted on YouTube...
View ArticleFirefox 18 released – 21 vulnerabilities patched
In the space of little under two months since version 17 was released, Mozilla has patched nearly 3000 reported bugs in their browser, along with 21 security vulnerabilities – 12 of which were...
View Article‘Red October’ Large Scale Cyber Espionage Campaign Revealed After 5 Years of...
The findings come after Kaspersky lab lead research into a series of targeted attacks aimed at various diplomatic, governmental and scientific research organizations (see map); dubbed Red October...
View ArticleUPnP – Security Researchers Say: “Unplug n’ Don’t Play”
What is UPnP? First launched in 1999, Universal Plug and Play (UPnP) technology is the product of an industry initiative to enable peer-to-peer data communication between any two devices on a home or...
View ArticleThe New York Times – Infiltrated by Chinese Hackers
It has emerged that the New York Times has fallen victim to a cyber espionage attack that began in September of 2012. The attacks appeared to be focused exclusively on accessing information from both...
View ArticleNews: Passcode Flaw in iOS v6.1
A flaw in Apple’s latest iOS release (v6.1) potentially allows a thief to access contacts, voicemails and make calls on a passcode protected iPhone. In a video posted on YouTube, a technique used to...
View ArticleReport: The safety of national infrastructure is greatly undermined by a lack...
Introduction SCADA is an acronym for Supervisory Control And Data Acquisition, a form of Industrial Control System (ICS) that typically controls and monitors larger scale industrial processes, public...
View ArticleFirefox and Chrome both patched after PWNing at CanSecWest
The annual PWN2OWN ‘battle of the browsers’ contest in Vancouver, organised by Google and HP’s Zero-Day-Initiative is an opportunity for some of the best talent from both the black hat and white hat...
View ArticleAside: School children phish teachers login credentials
School children phish teacher login details at a school in Alaska. A group of children allegedly obtained the details by fooling their teachers in to thinking they were authorising a software update....
View ArticleTrojan Android Apps Create an SMS Botnet
With the increase of Android based devices within the mobile phone market in recent years, it seems that some hackers are warming to the idea of creating more advanced malware targeted at android...
View ArticleUseful Router IOS Command list updated
I have updated the Useful Cisco IOS Commands (Router) command list to also include: Standard and extended ACLs NAT & PAT DHCP Some corrections to existing commands If you think this resource is of...
View ArticleFeature of Apple iOS exposes users to WiFi attacks
Have you ever glanced at your iPhone or iPad to find that you are automatically connected to a WiFi network that you didn’t tell it to connect to? Maybe it has the same SSID (network name) as a hotel’s...
View ArticleWhy using Perfect Forward Secrecy pays off
UPDATE – With the latest release of Mozilla Firefox (v.25) and the Calomel add-on, users can now view whether perfect forward secrecy is being used by a website, from within the Firefox browser. When...
View Article19 Vulnerabilities Patched in Microsoft November Update Cycle
Image courtesy of maximumpc.com Microsoft’s latest patch Tuesday included fixes for 19 separate vulnerabilities, spread over 8 security bulletins with 3 of the bulletins were rated with the maximum...
View Article0-day Uses .tiff Images as Delivery Vehicle for Remote Code Execution
What is TIFF? The Tagged Image File Format (.tiff) is an old image file format, still popular with many digital image manipulators and artists today. Unlike compressed image formats such as JPEG, TIFF...
View ArticleWhat’s new in HTTP version 2?
It has been fourteen years since the last revision of the ubiquitous HyperText Transfer Protocol, version 1.1. Since its conception in the early nineties, HTTP has indisputably become the de-facto...
View ArticleResearch highlights flaws in Internet routing protocol BGP
A provider of specialist Internet monitoring systems, Renesys, has published research which claims to show that large chunks of Internet traffic was diverted several times during the 2013 calendar...
View ArticleYahoo! Credentials Leaked
Yahoo! has announced they’ve discovered attempts to access Yahoo mail accounts. Little information has currently been released about what happened, but it appears a number of usernames and passwords...
View Article
More Pages to Explore .....