Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

To Listen Without Consent – Abusing the HTML5 Speech

I found a bug in Google Chrome that allows an attacker to listen on the user speech without any consent from the user and without any indication. Even blocking any access to the microphone under...

View Article


TLS: The Nuclear Option

Transport Layer Security (TLS), previously known as the Secure Sockets Layer (SSL), has been the de-facto solution for transport encryption on the Internet for quite some time. Is it time for a...

View Article


certified

It's a scary Internet out there. All your company's internal apps and service-to-service communication should be encrypted. Certified will help you generate all the certificates you need to make that...

View Article

Looking for malicious traffic in electrical SCADA networks - part 1

When infosec guys are performing intrusion detection, they usually look for attacks like portscans, buffer overflows and specific exploit signature. For example, remember OpenSSL heartbleed...

View Article

Alert regarding DNS cache poisoning attack

JPCERT-AT-2014-0016 JPCERT/CC 2014-04-15<<< JPCERT/CC Alert 2014-04-15 >>> Alert regarding DNS cache poisoning attack Source link:...

View Article


Video: Samsung Galaxy S5 Fingerprint Scanner also susceptible to ordinary spoofs

This video demonstrates how flaws in the implementation of fingerprint authentication in the Samsung Galaxy S5 expose users' devices, data, and even bank accounts to thieves or other attackers.click...

View Article

German Aerospace Center hit by serious malware-based attack

The German Aerospace Center was victim of a cyberespionage attack, many computers have been infected by sophisticated Trojans and other spyware.more...

View Article

Critical Java Update Plugs 37 Security Holes

Oracle has pushed a critical patch update for its Java SE platform that fixes at least 37 security vulnerabilities in the widely-installed program. Several of these flaws are so severe that they are...

View Article


You May Not Need to Debug SSE Instructions

There are binaries that contain implementation of an algorithm in two ways. The first one is optimized to run on all architectures and so it consists of i386 instructions only. The second one is...

View Article


Easter Hack: Even More Critical Bugs in SSL/TLS Implementations

It's been some time since my last blog post - time for writing is rare. But today, I'm very happy that Oracle released the brand new April Critical Patch Update, fixing 37 vulnerabilities in our...

View Article

SSLyze v 0.9 released - Heartbleed edition

 new version of SSLyze is now available. SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. This version brings a few improvements and bug fixes as well as...

View Article

Solaris 11 and Metasploit

Just to follow up on the different OS scenarios from the previous posts, here is a test done on Solaris 11.1 x86 in Qemu KVM. Setup is nothing special, standard way of creating hdd qcow2 image, and...

View Article

Reflected XSS Attacks vulnerabilities F-Secure Messaging Security Gateway...

I. VULNERABILITY-------------------------Reflected XSS Attacks vulnerabilities  F-Secure Messaging Security GatewayV7.5.0.892II. BACKGROUND-------------------------F-Secure Messaging Security Gateway...

View Article


RCMP charge teen in relation to Heartbleed bug attack on CRA

A University of Western Ontario computer science student has been arrested by the RCMP and will face charges on allegations that he exploited the Heartbleed Internet vulnerability to steal confidential...

View Article

Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC

Ruby openssl has a vulnerability when a public key is a issued prior writing to private key and is reopened during a script it spoofs a CA private key.PoC script https://gist.github.com/10446549

View Article


BackDoor.Gootkit.112—a new multi-purpose backdoor

Complex multi-component Trojans with backdoor features, i.e., those capable of executing a remote server’s commands on an infected computer, are rarities in the wild. Doctor Web's analysts recently...

View Article

Certificates Revoked per Day

Certificate Revocation Lists (“CRLs”) are used to track revoked certificates. Your browser will download these lists to verify if a certificate presented by a web site has been revoked. The graph above...

View Article


Exploiting CSRF under NoScript Conditions

CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this: you,...

View Article

The Heartbleed Aftermath: all CloudFlare certificates revoked and reissued

Eleven days ago the Heartbleed vulnerability was publicly announced.Last Friday, we issued the CloudFlare Challenge: Heartbleed and simultaneously started the process of revoking and reissuing all the...

View Article

Analyzing a banking Trojan

In our effort to detect threats to the users of Android devices, we analyze a lot of malicious apps. This post exemplifies the analysis of such malware, more specifically a banking Trojan that we came...

View Article
Browsing all 8064 articles
Browse latest View live