Queen of Britain has introduced the new penalties for the cyber hackers, who caused threaten to the national security. According to new Serious Crime Bill, the hackers, who were involved in the computer hacking and creating the chaos amongst the telecommunication, food distribution, and energy sectors are expected to face…
PDF in Android version allows attacker to access files
The android version of Adobe PDF Reader – contains a security virus that could allow an attacker to give and take documents stored in reader and other files stored on the android’s memory card. The security researcher says: the problem is because of few insecure Javascript interfaces. These Javascript interfaces…
Latest Android Crypto Exploit Allow Attacker to read WhatsApp , facebook , Instagram Chat Database
Bad programming practices , Android malware attack is to open the database backup WhatsApp chat. Boss Bosschert, a self- billed “consultant / sysadmin / business , ” that is used by WhatsApp messages stored locally on the local access database file system as any other Android, read by the application…
NYTimes.com XSS Vulnerability Allows Attacker to Post Fake Story
Sir Cumv3nt Virtual Threat (Contributing Writer) In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not […] ↓ Read the rest of this entry… View full…
Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup
Just today, Tactical Network Solutions has released the updated version of Reaver which is version 1.3. The new version “implements the short DH key optimizations described in the original vulnerability release paper, which reduces computation time on the target AP and increases the attack speed.” You can download the latest…
Mac OS X Lion vulnerability lets attacker change user password
A flaw in one of Mac OS X Lion’s command-line utilities has potentially opened a route for an attacker to change a user’s password without knowing the current password. But how big of a concern is it? The issue in question was first brought to light by Patrick Dunstan, author…
LIGATT: C.Conducts penetration test to determine what an attacker can find out about an info system during the reconnaissance and scanning phases
LIGATT: C.Conducts penetration test to determine what an attacker can find out about an info system during the reconnaissance and scanning phases View full post on Twitter / LIGATT