Monthly Archives: July 2015

Bash Bug Still Exploited, Report Finds 600,000 Shellshock Events in the Last 3 Months

Shellshock, the Bash bug heralded as the next Heartbleed is still being successfully exploited by attackers, 10 months after it has been revealed to the world. Discovered in late September 2014, the bug has gone through a series of patches, … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

Row Hammer DRAM Bug Now Exploitable via JavaScript, Most DDR3 Memory Chips Vulnerable

In March, security researchers have published a report detailing a problem with some memory chips which can be exploited to give attackers access to any computer using the latest DDR3 DRAM chips. The exploit was named Row Hammer (also spelled … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

How can hacker hack into Nuclear Reactors isolated networks?

**This article is only for educational purposes** Critical infrastructures like Oilrigs and nuclear reactors have sophisticated level of information security training & solutions to protect against cyber attack. However hackers are thinking one step ahead of security professionals to hack … Continue reading

Posted in Cyber Security, Malware | Tagged , , , | 1 Comment

Brinks’ Super-Secure Smart Safes: Not So Secure

MASTER THIEF WILLIE Sutton famously said he robbed banks because that’s where the money was. Of course, he also got caught. But today’s thieves don’t have to expose themselves to the extra security at banks, and risk getting caught, thanks … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

SSL, TLS y Seguridad Informática en México

SSL (Secure Socket Layer) es un protocolo antiguo en comparación con TLS (Transport Layer Security). TLS es un protocolo para la transmisión segura de datos en gran medida basado en SSLv según Webimprints, empresa de seguridad informática en México. TLS … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

Unhinged Linux backdoor still poses a nuisance, if not a threat

Internet Igors have stitched together a new Linux backdoor. Fortunately for internet hygiene the botnet agent – which packs a variety of powerful features – is faulty and only partially functional. The backdoor, dubbed Dklkt-1 was designed to be a … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

Google, Microsoft, Kaspersky Labs, NIC For Morocco Domains Hacked

Who says high-profile websites are unhackable? We just witnessed Moroccan hackers taking over websites of tech giants and those claiming to protect users from hackers. A group of hackers going with the handle of The Exploit3rs hacked and defaced the official … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

FBI director says terrorist interest in cyberattacks against the U.S. on the uptick

Federal Bureau of Investigation (FBI) Director James Comey told attendees of the Aspen Security Forum in Colorado that terrorists are discussing strategies for launching cyberattacks against the U.S. Comey didn’t specify the types of cyber assaults but said the planning appeared … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Bug exposes OpenSSH servers to brute-force password guessing attacks

A bug in OpenSSH, the most popular software for secure remote access to UNIX-based systems, could allow attackers to bypass authentication retry restrictions and execute many password guesses. A security researcher who uses the online alias Kingcope disclosed the issueon … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

Check your NoSQL database – 600 terabytes of MongoDB data publicly exposed on the internet

A total of 595.2 terabytes (TB) of data is exposed on the internet via publicly accessible MongoDB instances that don’t require any form of authentication. That is the claim of blogger and Shodan developer John Matherly, following an investigation. Shodan … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment