bushing gets mad at his aftermarket car nav unit nagging at him
This is the first of a several? part article on my adventures with my aftermarket in-dash navigation unit for my car, a Pioneer AVIC-5000NEX. I want to modify it to remove a nag screen. I will present...
View ArticleAndroid Hacking and Security, Part 5: Debugging Java Applications Using JDB
This article walks the readers through debugging Java programs using a command line tool called JDB. Though this article doesn’t touch Android concepts, this is a prerequisite to understand the next...
View Articlebradamsa- Burp Suite extension to generate Intruder payloads using Radamsa
Bradamsa is a Burp Suite extension for Radamsa, a well-known fuzzer made by the Oulu University Secure Programming Group. Inspired by burp-radamsa, this plugin allows to generate Intruder payloads...
View ArticleThe Role of VGX.DLL in the Context of the Latest IE 0-Day
On Saturday, April 26 Microsoft announced that Internet Explorer version 6 until version 11 is under potential risk against drive-by attacks from malicious websites, regardless of the underlying...
View ArticleSpiceWorks 7.2.00174 - Persistent XSS Vulnerabilities
# Exploit Title: Multiple Stored XSS vulnerabilities in SpiceWorks Ticketing system# Date: 12/05/2014# Exploit author: Dolev Farhi @f1nhack# Vendor homepage: http://spiceworks.com# Software Link:...
View ArticleLifeLock Survey Reveals That 47% of Consumers Who’ve Heard of the Heartbleed...
In light of the recent Heartbleed bug that left user credentials and sensitive information potentially susceptible to hackers and identity thieves, LifeLock (NYSE: LOCK), a leading provider of identity...
View ArticleCredit and Debit Card Fraud Tops American Security Concerns Amid Widespread...
Unisys survey shows customer loyalty drops following data breaches involving personal or credit card dataCredit and debit card fraud tops Americans' security concerns in 2014, against a recent backdrop...
View ArticlePaper: Operation Saffron Rose
We believe we’re seeing an evolution and development in Iranian-based cyber activity. In years past,Iranian actors primarily committed politically-motivated website defacement and DDoS...
View ArticleTrend Micro's Q1 Security Roundup Reveals Cybercriminals' Advanced Methods...
Cybercriminals targeting unlikely sources to carry out high-profile exploitsCybercriminals continuously discover more ways to successfully target new outlets for financial theft as revealed in Trend...
View ArticlePostal Service: Beware Stamp Kiosk Skimmers
The United States Postal Inspection Service is investigating reports that fraudsters are installing skimming devices on automated stamp vending machines at Post Office locations across the United...
View ArticleMetasploit: AlienVault 4.6.1 SQL Injection
Exploit Title: AlienVault newpolicyform.php SQLiDate: 5/9/2014Exploit Author: chrisdhebert[at]gmail.comVendor Homepage: http://www.alienvault.com/Software Link:...
View ArticleHow to Catch a Hacker in the Act
“As today 25 March 2014, PayPal is launching a new survey program. All customers are welcome to participate this survey. The survey will take 5 minutes and for your effort and understanding PayPal will...
View ArticleMicrosoft Security Advisory Notification
********************************************************************Title: Microsoft Security Advisory NotificationIssued: May 13,...
View ArticleMicrosoft Security Bulletin Summary for May 2014
********************************************************************Microsoft Security Bulletin Summary for May 2014Issued: May 13,...
View ArticleBroadcom PIPA C211 Information Disclosure vulnerabilities
Vulnerability title: Unauthenticated Credential And ConfigurationRetrieval In Broadcom Ltd PIPA C211CVE: CVE-2014-2046Vendor: Broadcom LtdProduct: PIPA C211Affected version: Soft Rev: SR1.1, HW Rev:...
View ArticleCheetah Mobile Releases Free App to Remove the Latest CryptoLocker RansomWare...
Cheetah Mobile (NYSE: CMCM), the security and utility app developer (formerly KS Mobile), today issued the free CM CryptoLocker Cleaner app to protect Android smartphone users from the malware known as...
View Article[RHSA-2014:0486-01] Critical: java-1.7.0-ibm security update
===================================================================== Red Hat Security AdvisorySynopsis: Critical: java-1.7.0-ibm security updateAdvisory ID:...
View ArticleA new Phishing attack using data URI is targeting Google accounts with a high...
A new Phishing attack that's based on data URI (uniform resource identifier) is targeting Google accounts with a high degree of success. Because of the way the attack is carried out, detection via...
View ArticleThreat Outbreak Alert: Fake Bank of Scotland Payment Transfer Notification...
Cisco Security Intelligence Operations has detected significant activity related to spam email messages that claim to contain a bank transfer notification for the recipient. The text in the email...
View ArticleSNOWDEN DOCUMENTS FROM NO PLACE TO HIDE
Glenn Greenwald’s No Place to Hide includes the following documents from the Snowden archiveclick here..........http://glenngreenwald.net/pdf/NoPlaceToHide-Documents-Compressed.pdf
View Article