The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must update their Tor browser to fix a critical vulnerability, dubbed TorMoil, that could leak their real IP addresses to potential attackers when they visit websites with certain content. The Tor Project released the Tor […]
Hacking
Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager
A highly critical vulnerability has been discovered in Oracle’s enterprise identity management system that can be easily exploited by remote, unauthenticated attackers to take full control over the affected systems. The critical vulnerability tracked as CVE-2017-10151, has been assigned the highest CVSS score of 10 and is easy to exploit […]
WordPress < 4.8.3 Vulnerable To SQL Injection (SQLI) Exploit
A security researcher named “Anthony Ferrara” has found a critical SQL Injection (SQLI) vulnerability in the WordPress CMS. According to WordPress team, the vulnerability exists in all previous versions of the CMS, Whereas the vulnerability has been patched in the latest WordPress version 4.8.3 released which was released yesterday. Therefore, […]
Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal
Latest warning coming out from Canada about sophisticated ATM skimming called “Shimmers” targeted chip-based credit and Debit cards to steal your entire card information form POS(Point-of-sale) terminal. Basically many skimming devices record your card information in plain text on the magnetic stripe on the backs of cards. Last Year November ATM based Skimmer has […]
Software code signing certificates worth more than guns on the Dark Web
Researchers have discovered that digital code signing certificates are being sold for more than is required to buy a gun in the web’s underground markets. On Tuesday, security researchers from Venafi said there is a flourishing trade in the sale of digital code signing certificates, which can be used to verify software […]
Vulnerabilities in Google Issue Tracker exposed details about unpatched flaws
A flaw in the Google Issue Tracker, also known as the “Buganizer,” might have exposed details about unpatched flaws listed in the database. A vulnerability in the Google Issue Tracker, also known as the “Buganizer,” might have exposed details about unpatched flaws listed in the database. The flaw was reported […]
Gaza Cybergang is back, it leverages new tools against new targets
Gaza Cybergang threat actor it is back again, this time it is targeting organizations in the Middle East and North Africa (MENA) region. Gaza Cybergang is a threat actor that is believed to be linked to the Palestinian organization Hamas, it is back again targeting organizations in the Middle East and North Africa […]
iPhone Apps you granted camera access can secretly take photos and record video
A serious privacy issue in iPhone that could be exploited by iOS app developers to silently take your photos and record your live video by enabling cameras. Do you use an iPhone? If yes, there is probably something that you need to know about it! The Austrian developer and Google engineer, […]
LokiBot trojan turns itself into ransomware if you decide to remove it
Security researchers from SfyLabs have detected an Android banking trojan dubbed LokiBot that transforms itself into a complete ransomware once the targeted user attempts to uninstall it from the infected device. LokiBot malware has been in the news since June and its makers have been pushing out new features almost […]
North Korea is behind the WannaCry Attack on NHS according to British intelligence
The defense minister Ben Wallace said the administration now believes a North Korean hacking crew was engaged but ended short of suggesting the UK could carry out retaliatory attacks. “This attack, we think quite firmly that this came from a foreign state,” Mr. Wallace said. Adding that the state needed […]