Source: National Cyber Security – Produced By Gregory Evans Location: Chicago, IL Summary: A brand new cyber-security team has formed to address vulnerabilities in IoT/medical devices. This leader will build out their risk/vulnerability capabilities for this group. We are seeking a seasoned manager who understands technical aspects of Vulnerability The…
ACAS Vulnerability Analyst
Source: National Cyber Security – Produced By Gregory Evans Description Title: ACAS Vulnerability Analyst Location: Quantico, Virginia Openings: 2 Clearance: Requires minimum of active Secret Clearance DoD 8570 Certification Requirements: IAT III or IAM II (CISA, GSE, SCNA, or CISSP (or Associate), CAP, GSLC, CISM) – (requires at The post ACAS Vulnerability Analyst appeared first on…
Vine vulnerability lets hacker download the complete source code
Source: National Cyber Security – Produced By Gregory Evans A hacker looking for bug bounties has stumbled across a security hole in Vine that allowed him to download the entire source code from a publicly accessible website. He was awarded over $10,000 for the discovery of the blatant internal oversight….
Hackers exploit WiFi vulnerability to neutralise Mitsubishi Outlander alarm
Source: National Cyber Security – Produced By Gregory Evans Hackers have exposed a vulnerability in the Mitsubishi Outlander plug-in hybrid electric vehicle that could allow the car’s anti-theft alarms to be disabled. The flaw was discovered by security researchers Pen Test Partners, which investigates potential vulnerabilities in connected devices using…
CHINESE HACKERS ALLEGEDLY BLACKMAIL FOREX BROKERS USING MT4 PROTOCOL VULNERABILITY
Chinese hackers are allegedly launching cyber attacks on the popular MetaTrader 4 trading platform and are demanding ransom from online forex brokers using it, in order to stop the attacks. According to a report of the LeapRate website, quoting broker sources, the hackers are exploiting an encryption vulnerability in the…
Unpatched eBay vulnerability leaves shoppers at risk of downloading malware
Source: National Cyber Security – Produced By Gregory Evans Be extra careful the next time you visit a suspicious-looking eBay store page. According to Help Net Security, researchers from the Check Point security firm have discovered a vulnerability in the eBay platform that allows criminals to distribute malware by bypassing the…
F-35 cyber security testing delay prompts vulnerability concerns
Source: National Cyber Security – Produced By Gregory Evans The F-35 fighter jet could allegedly be vulnerable to cyber attacks, according to concerns raised in recent reports focusing on the potential vulnerability of the F-35 computer. US political website, Politico first reported in September that “military officials delayed key cyber-security…
How researchers hack Google using XXE vulnerability !
Source: National Cyber Security – Produced By Gregory Evans What is most secure website? NOTHING. Even Google is vulnerable to all sort of attacks! Security researchers and Co-Founders of Detectify have discovered a critical security vulnerability in Google that allowed them to access Internal servers. The vulnerability exists in the…
OpenSSL vulnerability allows hackers to read 64k of memory on target server
Source: National Cyber Security – Produced By Gregory Evans A potentially critical security vulnerability in OpenSSL has been discovered that allows an attacker to read up to 64kilobytes of memory from the server running a vulnerable OpenSSL version. As a normal user, you may not aware what is OpenSSL. It…
NSA denies Report that Agency knew and exploited Heartbleed Vulnerability
Source: National Cyber Security – Produced By Gregory Evans The Bloomberg claimed that the U.S. National Security Agency (NSA) knew about the most critical Heartbleed flaw and has been using it on a regular basis to gather “critical intelligence” and sensitive information for at least past two years and decided…