-
Sep 12, 2019
Some updates here! Researchers from AdaptiveMobile Security have uncovered a new and previously undetected vulnerability and associated exploits, called Simjacker. This vulnerability is currently being actively exploited by a specific private company that works with governments to monitor individuals. Simjacker… read more »
-
Sep 12, 2019
Browser fingerprinting is an incredibly accurate method of tracking online activity but, luckily, there are a few things you can do to try to wipe your fingerprints. TL;DRAre you a privacy obsessed? Don't use an unusual browser! What is browser… read more »
-
Sep 11, 2019
Intel chipset can be exploited to sniff SSH passwords as they're typed over the network. In 2011, Intel introduced a feature called Data-Direct I/O (DDIO) its server processors that allowed network cards and other peripherals to connect directly to a… read more »
-
Sep 10, 2019
Ok, it is true that Exim is one of the most used SMTP servers in the world, and for this reason it is continuously monitored by many security experts, but in the last months the Remote Code Execution vulnerabilities found… read more »
-
Sep 9, 2019
A lot of interesting topics in the last week! Cybersecurity https://twitter.com/GossiTheDog/status/1170014744176148481 Let's get this party started! No, XKCD too? XKCD Forum Breach Exposes Emails, Passwords of 562,000 Users https://xkcd.com/327/ The forums of the XKCD webcomic created by Randall Munroe in… read more »
-
Sep 7, 2019
There’s been a lot of discussion about BlueKeep, a security hole in the Windows Remote Desktop Protocol that allows a remote attacker to access your machine. https://twitter.com/GossiTheDog/status/1170014744176148481 According to this article by Brent Cook on the Rapid7 site: Today, Metasploit… read more »
-
Sep 6, 2019
KolibriOS is an open source operating system with a monolithic preemptive kernel, video drivers, for 32-bit x86 architecture computers. The entire operating system with a good set of application fits into a 1.44 Mb Floppy Disk. The project is an… read more »
-
Sep 5, 2019
Researchers at CheckPoint said that over half of all Android handsets are vulnerable to a over-the-air (OTA) SMS phishing attack that could allow an attacker to route all internet traffic through a rogue proxy that can sniff traffic and steal… read more »