To Listen Without Consent – Abusing the HTML5 Speech
I found a bug in Google Chrome that allows an attacker to listen on the user speech without any consent from the user and without any indication. Even blocking any access to the microphone under...
View ArticleTLS: The Nuclear Option
Transport Layer Security (TLS), previously known as the Secure Sockets Layer (SSL), has been the de-facto solution for transport encryption on the Internet for quite some time. Is it time for a...
View Articlecertified
It's a scary Internet out there. All your company's internal apps and service-to-service communication should be encrypted. Certified will help you generate all the certificates you need to make that...
View ArticleLooking for malicious traffic in electrical SCADA networks - part 1
When infosec guys are performing intrusion detection, they usually look for attacks like portscans, buffer overflows and specific exploit signature. For example, remember OpenSSL heartbleed...
View ArticleAlert regarding DNS cache poisoning attack
JPCERT-AT-2014-0016 JPCERT/CC 2014-04-15<<< JPCERT/CC Alert 2014-04-15 >>> Alert regarding DNS cache poisoning attack Source link:...
View ArticleVideo: Samsung Galaxy S5 Fingerprint Scanner also susceptible to ordinary spoofs
This video demonstrates how flaws in the implementation of fingerprint authentication in the Samsung Galaxy S5 expose users' devices, data, and even bank accounts to thieves or other attackers.click...
View ArticleGerman Aerospace Center hit by serious malware-based attack
The German Aerospace Center was victim of a cyberespionage attack, many computers have been infected by sophisticated Trojans and other spyware.more...
View ArticleCritical Java Update Plugs 37 Security Holes
Oracle has pushed a critical patch update for its Java SE platform that fixes at least 37 security vulnerabilities in the widely-installed program. Several of these flaws are so severe that they are...
View ArticleYou May Not Need to Debug SSE Instructions
There are binaries that contain implementation of an algorithm in two ways. The first one is optimized to run on all architectures and so it consists of i386 instructions only. The second one is...
View ArticleEaster Hack: Even More Critical Bugs in SSL/TLS Implementations
It's been some time since my last blog post - time for writing is rare. But today, I'm very happy that Oracle released the brand new April Critical Patch Update, fixing 37 vulnerabilities in our...
View ArticleSSLyze v 0.9 released - Heartbleed edition
new version of SSLyze is now available. SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. This version brings a few improvements and bug fixes as well as...
View ArticleSolaris 11 and Metasploit
Just to follow up on the different OS scenarios from the previous posts, here is a test done on Solaris 11.1 x86 in Qemu KVM. Setup is nothing special, standard way of creating hdd qcow2 image, and...
View ArticleReflected XSS Attacks vulnerabilities F-Secure Messaging Security Gateway...
I. VULNERABILITY-------------------------Reflected XSS Attacks vulnerabilities F-Secure Messaging Security GatewayV7.5.0.892II. BACKGROUND-------------------------F-Secure Messaging Security Gateway...
View ArticleRCMP charge teen in relation to Heartbleed bug attack on CRA
A University of Western Ontario computer science student has been arrested by the RCMP and will face charges on allegations that he exploited the Heartbleed Internet vulnerability to steal confidential...
View ArticleRuby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
Ruby openssl has a vulnerability when a public key is a issued prior writing to private key and is reopened during a script it spoofs a CA private key.PoC script https://gist.github.com/10446549
View ArticleBackDoor.Gootkit.112—a new multi-purpose backdoor
Complex multi-component Trojans with backdoor features, i.e., those capable of executing a remote server’s commands on an infected computer, are rarities in the wild. Doctor Web's analysts recently...
View ArticleCertificates Revoked per Day
Certificate Revocation Lists (“CRLs”) are used to track revoked certificates. Your browser will download these lists to verify if a certificate presented by a web site has been revoked. The graph above...
View ArticleExploiting CSRF under NoScript Conditions
CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this: you,...
View ArticleThe Heartbleed Aftermath: all CloudFlare certificates revoked and reissued
Eleven days ago the Heartbleed vulnerability was publicly announced.Last Friday, we issued the CloudFlare Challenge: Heartbleed and simultaneously started the process of revoking and reissuing all the...
View ArticleAnalyzing a banking Trojan
In our effort to detect threats to the users of Android devices, we analyze a lot of malicious apps. This post exemplifies the analysis of such malware, more specifically a banking Trojan that we came...
View Article