Zeljka Zorz
OS X zero day bug allows hackers to bypass system integrity protection
An OS X zero day vulnerability could allow attackers to bypass System Integrity Protection, Apple’s newest protection feature, and to escalate their privileges, simplifying …
Emergency Java update plugs system compromise hole
Oracle has issued an emergency security update for Java to plug a critical flaw (CVE-2016-0636) that could be exploited by luring users to visit a web page hosting the …
RCE flaw affects DVRs sold by over 70 different vendors
RSA security researcher Rotem Kerner has discovered a remote code execution vulnerability that affects digital video recorders (DVRs) sold by more than 70 different vendors …
Cheap radio attack can be used to unlock and steal 24 car models
A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …
How to block malicious macros for good?
Microsoft is finally doing something about the increasing threat of malicious macros: it has added a new feature in Office 2016 that will block macros from loading in certain …
Tor Project exploring ways to keep its software and users safe
In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …
Cyber crooks spread Surprise ransomware via TeamViewer
A new ransomware family has been encrypting users’ files and appending the .surprise extension to them. The malware itself doesn’t differ much from other similar …
Apple updates its products, fixes iMessages zero-day
On Monday Apple has pushed out updates for its many products: iOS, OS X, OS X Server, Safari, watchOS, tvOS, and Xcode. Of these, the most eagerly awaited was that for iOS, as …
Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …
Carbanak cyber-thieves’ newest attacks exposed
The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …
iOS zero-day breaks Apple’s iMessage encryption
A team of Johns Hopkins University researchers headed by computer science professor Matthew Green have discovered a zero-day flaw in Apple’s iOS encryption, which could …
Google offers binary comparison tool BinDiff for free
In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)