Zeljka Zorz
iOS 9 partially fixes critical, easily exploitable AirDrop bug
Apple has released iOS 9. Along with many new and improved security and privacy features, fixes for a bucketload of security vulnerabilities have been included in this latest …
Behind the scenes at BruCON, a European hacker conference
Setting up a local conference seems to be a popular way for infosec pros that haven’t got the time or means to travel to bring the people they want to meet and the …
New POS Trojan created by mixing code from older malware
“A newly discovered POS Trojan is a perfect example of how easy it is for malware makers to come up with new malware – they can simply recycle code used in older …
Microsoft details how Device Guard fights malware in Windows 10
As Windows 10 was being prepared for release, Microsoft presented many new security features (and we’ve written about some) to be included in the new version of the …
Persistent XSS flaw in SharePoint 2013 revealed, patched
Among the vulnerabilities patched earlier this month by Microsoft is an important one that endangers users of Microsoft SharePoint 2013, a web application platform in the …
Android 5 bug allows attackers to easily unlock password-protected devices
If you own a mobile device running any Android 5 version but the very last (v5.1.1) and you use a password to lock your device, you will want to update your OS or switch to a …
Privacy International helps individuals find out if they were spied on by the GCHQ
Continuing with its “Did GCHQ Illegally Spy On You?” campaign, Privacy International has set up a website with instructions for individuals and organizations on how to …
Malicious router implants open permanent entry points into target networks
“FireEye researchers have discovered 14 Cisco routers in India, Mexico, Philippines and Ukraine that have been implanted with malware that allows attackers to gain and …
Tor security improves as .onion becomes a special-use domain name
The .onion domain has been officially designated by the Internet Assigned Numbers Authority (IANA) as a special-use domain name. The move, initiated by the Internet …
Researchers find backdoor bug in NASA rovers’ real-time OS
A critical, remotely exploitable vulnerability in VxWorks, the world’s most popular real-time operating system (RTOS), can be exploited by attackers to gain backdoor …

Next Generation Red Teaming
Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …
New malware can make ATMs not give users’ card back
“A new type of malware that can be used to compromise ATMs independently of who their manufacturer is, and can make the machine steal card data but also the cards …