-
Nov 22, 2019
Researchers from Checkmarx Security Research Team has discovered and disclosed a vulnerability [2] in Android camera app that may allows a malicious app to bypass camera access permissions. How it works? Android camera applications usually store their photos and videos… read more »
-
Nov 21, 2019
Update your client ASAP! In October, a double-free vulnerability was disclosed in WhatsApp messenger: this flaw could be triggered through the sending of a crafted .GIF file and, if exploited, could result in the remote execution of code. The vulnerability… read more »
-
Nov 20, 2019
Researchers at Purdue College and University of Iowa have revealed a paper detailing how the baseband processors of a large number of common Android smartphones may be compromised using malicious USB and Bluetooth accessories. The research team is, for the… read more »
-
Nov 19, 2019
Researchers by security firm Kryptowire have discovered and revealed 146 vulnerabilities in various version of Android. The vulnerabilities were found by scanning the phones of 29 different Android models using a set of custom automated tools [1]. https://www.youtube.com/watch?v=8GK9RiyKRXU The discovery… read more »
-
Nov 18, 2019
The week kicked off with the launch of Disney+, but also other things happened! So let's not waste time, and let's start to talk about WhatsApp, ZoneAlarm, Telegram, Python, Java and JQuery, Further, some news about Elon Musk's Neuralink, a… read more »
-
Nov 15, 2019
The e-mail provider Tutanota advertises to be the "world's most secure e-mail service". The company offers encrypted e-mail communication and claims to have six million customers relying on this security promise. However, on October 2, 2018, the district court of… read more »
-
Nov 15, 2019
Just a short post to report an interesting phenomenon! Today i've been targeted by an unusual phishing attempt on my Facebook account: I've received a notification sayng that a account named Fəcebook Servıce 05 (pay attention to ə character) the… read more »
-
Nov 14, 2019
Security researchers at Purdue University and the University of Iowa have found new vulnerabilities that can be used to track a victim’s real-time location, spoof emergency alerts or silently disconnect a phone from the 5G network. Despite some net neutrality… read more »
-
Nov 13, 2019
UPDATE 2019/11/14: Facebook released version 247.0 that fixes the glitch. Joshua Maddux published on his Twitter account a video captured from an iPhone running iOS 13.2.2: in this video, a glitch in the interface of Facebook App reveals that the… read more »
-
Nov 12, 2019
Some days ago, a group of servers belonging to multiple VPN providers has been breached.After this events, many people have expressed doubts about the real usefulness of VPNs. In my opinion, VPNs are great privacy tools, but some providers tryes… read more »
-
Nov 11, 2019
Over the past seven days, i've read a lot of interesting news.So, today let's talk about the BerlusconiMarket shutdown, LulSecITA and FifthOfNovember, ransomware attack on a hospital, GoLang birthday, Apple vs. Electron, EA and VisualStudio, GraphQL, strange naming policies for… read more »
-
Nov 8, 2019
FireEye reports on a Chinese-sponsored espionage campaign to eavesdrop on text messages, violating telco servers: yet another example that demonstrates why end-to-end message encryption is so important. A new malware, dubbed “Messagetap”, developed by the Chinese APT41 [2] hacker group… read more »
-
Nov 7, 2019
Security researchers from Akamai published interesting details about the Web Services Dynamic Discovery (WS-Discovery) protocol, which they say can be abused to launch massive DDoS attacks. What is WS-Discovery? WS-Discovery is a multicast protocol that can be used on local networks… read more »
-
Nov 6, 2019
Researchers from the University of Michigan and the University of Electro-Communications in Tokyo, demonstrated that is possible to hack smart voice assistants like Siri, Alexa and Google using a lasers beam to send them inaudible commands. This new technique, dubbed… read more »
-
Nov 5, 2019
It was just a matter of time: the first "mass exploiting" of BlueKeep vulnerability is spotted in the wild.If you haven’t already patched your servers, do it asap! Last sunday, security researcher Kevin Beaumont posted a tweet about a large… read more »
-
Nov 4, 2019
A lot of links this week! Today let's talk about #KKNPP, #DKIM, #DFIR and #TimelineExplorer, #iPhone, #Whatsapp and #NSOGroup, #Powertool, #Protonmail, #Unicredit, #linustorvalds, #guidovanrossum and #python, #themandalorian and #bladerunner. Cybersecurity It's official, administrative network at Kudankulam Nuclear Power Plant was… read more »
-
Nov 1, 2019
Yesterday, Google engineers released an urgent update for the Chrome browser to patch an actively exploited zero-day. The release of Chrome 78.0.3904.87 fix two high severity vulnerabilities, one affecting Chrome's audio component (CVE-2019-13720) while the other resides in the PDFium… read more »
-
Nov 1, 2019
How feasible are Warp Drives?A new theory opens the door to the possibility of creating a real warp drive (in the future!). The trick is to make space-time travelling around the ship and not the other way around, but the… read more »
-
Oct 31, 2019
Recently, a team of cybersecurity researchers from Cologne University of Applied Sciences (Hoai Viet Nguyen and Luigi Lo Iacono) has disclosed a new cache poisoning attack against CDN systems that could be used to force a website into delivering error… read more »
-
Oct 30, 2019
Remember the Tamagotchi?Simone Margaritelli/Evilsocket created the Pwnagotchi, a mix between a game from the 90s and a wardriving tool, with a touch of machine learning. Pwnagotchi is a DIY, open source gadget running on a Raspberry Pi Zero W for… read more »