-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: July 2015
Bash Bug Still Exploited, Report Finds 600,000 Shellshock Events in the Last 3 Months
Shellshock, the Bash bug heralded as the next Heartbleed is still being successfully exploited by attackers, 10 months after it has been revealed to the world. Discovered in late September 2014, the bug has gone through a series of patches, … Continue reading
Row Hammer DRAM Bug Now Exploitable via JavaScript, Most DDR3 Memory Chips Vulnerable
In March, security researchers have published a report detailing a problem with some memory chips which can be exploited to give attackers access to any computer using the latest DDR3 DRAM chips. The exploit was named Row Hammer (also spelled … Continue reading
How can hacker hack into Nuclear Reactors isolated networks?
**This article is only for educational purposes** Critical infrastructures like Oilrigs and nuclear reactors have sophisticated level of information security training & solutions to protect against cyber attack. However hackers are thinking one step ahead of security professionals to hack … Continue reading
Posted in Cyber Security, Malware
Tagged badusb, ghostusb, nuclear plant hack, usb malware
1 Comment
Brinks’ Super-Secure Smart Safes: Not So Secure
MASTER THIEF WILLIE Sutton famously said he robbed banks because that’s where the money was. Of course, he also got caught. But today’s thieves don’t have to expose themselves to the extra security at banks, and risk getting caught, thanks … Continue reading
SSL, TLS y Seguridad Informática en México
SSL (Secure Socket Layer) es un protocolo antiguo en comparación con TLS (Transport Layer Security). TLS es un protocolo para la transmisión segura de datos en gran medida basado en SSLv según Webimprints, empresa de seguridad informática en México. TLS … Continue reading
Unhinged Linux backdoor still poses a nuisance, if not a threat
Internet Igors have stitched together a new Linux backdoor. Fortunately for internet hygiene the botnet agent – which packs a variety of powerful features – is faulty and only partially functional. The backdoor, dubbed Dklkt-1 was designed to be a … Continue reading
Google, Microsoft, Kaspersky Labs, NIC For Morocco Domains Hacked
Who says high-profile websites are unhackable? We just witnessed Moroccan hackers taking over websites of tech giants and those claiming to protect users from hackers. A group of hackers going with the handle of The Exploit3rs hacked and defaced the official … Continue reading
FBI director says terrorist interest in cyberattacks against the U.S. on the uptick
Federal Bureau of Investigation (FBI) Director James Comey told attendees of the Aspen Security Forum in Colorado that terrorists are discussing strategies for launching cyberattacks against the U.S. Comey didn’t specify the types of cyber assaults but said the planning appeared … Continue reading
Bug exposes OpenSSH servers to brute-force password guessing attacks
A bug in OpenSSH, the most popular software for secure remote access to UNIX-based systems, could allow attackers to bypass authentication retry restrictions and execute many password guesses. A security researcher who uses the online alias Kingcope disclosed the issueon … Continue reading
Check your NoSQL database – 600 terabytes of MongoDB data publicly exposed on the internet
A total of 595.2 terabytes (TB) of data is exposed on the internet via publicly accessible MongoDB instances that don’t require any form of authentication. That is the claim of blogger and Shodan developer John Matherly, following an investigation. Shodan … Continue reading