Thứ Bảy, 25 tháng 7, 2015

Car Hacking ? Scary, But Now it’s REALITY!

Next time you find yourself hooked up behind the wheel, make sure that your car is actually in your control.
Hackers are now able to break into hundreds of thousands of vehicles on the road.
Car hacking is a hot topic today and until now it was performed only while researchers were hard-wired into a car's electrical system.
However, the most recent hack performed by two computer hackers, who have

All Smartwatches are vulnerable to Hackers





Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch.



Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks.



In a study, HP's Fortify tested today's top 10 smartwatches for security features, such

Thứ Sáu, 24 tháng 7, 2015

Introducing 93Gbps High-Speed Tor-Like Encrypted Anonymous Network





I think you'll agree with me when I say:



It's quite hard to maintain anonymity on the Internet using the slow Tor network. Or is it?



Well, it turns out, you may soon boost your online anonymity dramatically with the help of a new high-speed anonymity network.



A group of six academics have developed a Tor network alternative for users that allows high-speed anonymous web surfing,

RCSAndroid — Advanced Android Hacking Tool Leaked Online





As digging deeper and deeper into the huge Hacking Team data dump, security researchers are finding more and more source code, including an advanced Android Hacking Tool.



Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android

Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer





How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four.



The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine.



All the four zero-days originally were reported to Microsoft, affecting

Thứ Năm, 23 tháng 7, 2015

WordPress 4.2.3 Security Update Released, Patches Critical Vulnerability





WordPress has just released the new version of its content management system (CMS), WordPress version 4.2.3, to fix a critical security vulnerability that could have been exploited by hackers to take over websites, affecting the security of its Millions of sites.



WordPress version 4.2.3 resolves a Cross-Site Scripting (XSS) flaw that could allow any user with the Contributor or Author role

Bug in OpenSSH Opens Linux Machines to Password Cracking Attack





A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period.



OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a