-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: February 2016
Using the Microsoft EMET security tool to hack itself
[pheThe security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to … Continue reading
90 Percent of All SSL VPNs Use Insecure or Outdated Encryption
Many SSL VPNs don’t use the latest encryption tech. Information security firm High-Tech Bridge has conducted a study of SSL VPNs (Virtual Private Networks) and discovered that nine out of ten such servers don’t provide the security they should be offering, … Continue reading
Posted in Vulnerabilidad
Leave a comment
Tim Cook goes off-script describing FBI iPhone backdoor request as ‘cancer’
Say what you like about Apple, one thing is for sure — it is one of the most scripted and tightly-controlled companies in existence. Everything is stage-managed to within an inch of its existence. Leaks about upcoming releases are rare, … Continue reading
Operation Blockbuster Coalition Ties Destructive Attacks to Lazarus Group
The nation-state sponsored hacker group allegedly behind the 2014 attack against Sony Pictures Entertainment has been linked to similar intrusions against a number of companies in South Korea including the Dark Seoul and Operation Troy attacks. A coalition of security … Continue reading
Posted in Vulnerabilidad
Leave a comment
HOW TO SECURE DATABASES?
Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property, employees or customers. Confidential data may include the customer data, employee’s salary data, employee address data, patient records, … Continue reading
Analysis of CVE-2016-0059 – Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet
This month Microsoft patched two vulnerabilities which were discovered and reported by me, one is an information disclosure vulnerability in Internet Explorer (IE) (CVE-2016-0059 in MS16-009), the other is a memory corruption vulnerability in Microsoft Office (CVE-2016-0055 in MS16-015). In this blog, we will … Continue reading
Google Paid $25,633.70 for a Critical Chrome Bug
Google fixes bug for SOP and sandbox mode escape. Google has released version 48.0.2564.116 of its Chrome browser to address a critical issue regarding the browser’s SOP (Same-Origin Policy). The Google Chrome Security team was alerted to the presence of this … Continue reading
Posted in Vulnerabilidad
Leave a comment
Here’s Why John McAfee Is Ready To Decrypt The iPhone For FBI Free Of Charge
Short Bytes: “Cybersecurity legend” John McAfee has bashed the policies of American government’s stance on encryption. Taking Apple’s side, McAfee has offered FBI to allow him to decrypt the iPhone, free of charge. He called it a way to avoid the … Continue reading
Anonymous Hacker Arrested By The FBI In Hospital Computer Hacking Case
Short Bytes: Martin Gottesfeld, the alleged Anonymous hacker responsible for 2014’s hacking attack at Boston Children’s Hospital, has been arrested by the FBI. Martin’s co-workers and relatives contacted the security agency after he went missing, only to be rescued by a … Continue reading
Operation NITRO ZEUS: US’ Cyber War Plan to Destroy All of Iran’s Infrastructure
Stuxnet was only a small virus, the US had bigger weapons. Oscar-winning director Alex Gibney will be premiering today his latest documentary at the Berlin film festival. The documentary is called “Zero Days” and is an investigation into a top-secret US … Continue reading
Posted in Cyber Security, Malware, Vulnerabilidad
Leave a comment