Monthly Archives: July 2015

Bash Bug Still Exploited, Report Finds 600,000 Shellshock Events in the Last 3 Months

Shellshock, the Bash bug heralded as the next Heartbleed is still being successfully exploited by attackers, 10 months after it has been revealed to the world. Discovered in late September 2014, the bug has gone through a series of patches, … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

Row Hammer DRAM Bug Now Exploitable via JavaScript, Most DDR3 Memory Chips Vulnerable

In March, security researchers have published a report detailing a problem with some memory chips which can be exploited to give attackers access to any computer using the latest DDR3 DRAM chips. The exploit was named Row Hammer (also spelled … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

How can hacker hack into Nuclear Reactors isolated networks?

**This article is only for educational purposes** Critical infrastructures like Oilrigs and nuclear reactors have sophisticated level of information security training & solutions to protect against cyber attack. However hackers are thinking one step ahead of security professionals to hack … Continue reading

Posted in Cyber Security, Malware | Tagged , , , | 1 Comment

Brinks’ Super-Secure Smart Safes: Not So Secure

MASTER THIEF WILLIE Sutton famously said he robbed banks because that’s where the money was. Of course, he also got caught. But today’s thieves don’t have to expose themselves to the extra security at banks, and risk getting caught, thanks … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

SSL, TLS y Seguridad Informática en México

SSL (Secure Socket Layer) es un protocolo antiguo en comparación con TLS (Transport Layer Security). TLS es un protocolo para la transmisión segura de datos en gran medida basado en SSLv según Webimprints, empresa de seguridad informática en México. TLS … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

Unhinged Linux backdoor still poses a nuisance, if not a threat

Internet Igors have stitched together a new Linux backdoor. Fortunately for internet hygiene the botnet agent – which packs a variety of powerful features – is faulty and only partially functional. The backdoor, dubbed Dklkt-1 was designed to be a … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

Google, Microsoft, Kaspersky Labs, NIC For Morocco Domains Hacked

Who says high-profile websites are unhackable? We just witnessed Moroccan hackers taking over websites of tech giants and those claiming to protect users from hackers. A group of hackers going with the handle of The Exploit3rs hacked and defaced the official … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment