The AUTOcyb -The World's First Automotive Black Box / Event Data Recorder...
Vehicle connector lockout protects the security, integrity and authenticity of cyber dataSOUTHERN PINES, N.C., Jan. 10, 2013 /PRNewswire-iReach/ -- The U.S. government rulemaking proposal seeks to...
View Article[RHSA-2013:0154-01] Critical: Ruby on Rails security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1===================================================================== Red Hat Security AdvisorySynopsis: Critical: Ruby on Rails...
View ArticleMetasploit: Java Applet JMX Remote Code Execution
###By egypt, sinn3r, juan vazquez# This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more...
View ArticlePHP Lite Admin 1.9.3 Code Injection Vulnerability
# Exploit Title: phpliteadmin <= 1.9.3 Remote PHP Code Injection Vulnerability# Google Dork: inurl:phpliteadmin.php (Default PW: admin)# Date: 01/10/2013# Exploit Author: L@usch - http://la.usch.io...
View ArticleHow to Be Scam-Free In the New Year
From the top scams of 2012, Scambook has assembled their most helpful tips to protect consumers from fraud and identity theft in 2013. What better time for consumers to organize their life and increase...
View ArticleE-Investigations Develops a 5 Step Data Security Plan for Employee...
To prevent incidents of sabotage to company data (i.e. destruction, alteration or removal of proprietary information), businesses should make a habit of following certain key steps to ensure the...
View ArticleThe Hefty Price Tag of Being Hacked Takes Many Forms – Penetration Testing...
Just like advancements in medicine and technology, the world of cyber threats never stops evolving. Global Digital Forensics has spent the last two decades evolving with it and offers penetration...
View Article404 And You've Been Exploited
Most of the time, when analyzing malicious web pages, HTTP response code is one of my important indicators in order to determine the behaviour of the page (whether it is successful, unsuccessful,...
View ArticleAl Qassam Group Added ZionsBank To Its Targets' Collection
Qassam Group's continue to step up attacks on banks adding another financial institution to its list. They claim attacks will continue until the Anti-Islam video remains on the Internet.Yesterday,...
View ArticleFujitsu Revolutionizes the Self-Checkout Experience With StopLift Checkout...
New Video Analytics Technology Minimizes Interventions, Accurately Detects Theft, and Improves Customer Experience at Self-Checkout StationsNEW YORK, NY--(Marketwire - Jan 11, 2013) - Fujitsu today...
View ArticleToday's NIST CVE Issuance's For Vulnerabilities In rssh And JRE component in...
Click on the underlined CVE for additional vuln specific infoCVE-2012-2252Summary: Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to...
View ArticleThreat Outbreak Alert: Fake Social Media Training Notification E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a Social Media Training Plan for the recipient. The text in the...
View ArticleCybercrime centre 'will work with FBI, US secret service
INTERVIEW / The EU’s new European Cybercrime Centre (EC3), to be inaugurated in The Hague today (11 January), will co-operate closely with the FBI and the US secret service in addition to other foreign...
View ArticleRT Jailbreak Tool- An all-in-one program to jailbreak Windows RT tablets...
InstallationExtract to a folder on your tablet, double-click 'runExploit.bat'.The first time you run the exploit (or if you ever uninstall the ModernUI component of the exploit) it will launch...
View ArticleFake Google Chrome Updates Return
“Oh hey, a new Chrome update! I’d better hurry up and download the file from this random website with no apparent connection to anything remotely related to my web browser”.There are things better left...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (17) ==r15118...
View Article[SE-2012-01] 'Fix' for Issue 32 exploited by new Java 0-day code
We were notified today of ongoing attacks with the use of a newJava vulnerability affecting latest version 7 Update 10 of thesoftware [1][2].Due to the unpatched status of Issue 50 [3] and some...
View ArticleHP Serviceguard on Linux, Remote Denial of Service (DoS)
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Note: the current version of the following document is available...
View ArticleCoolPlayerPlusPortable 2.19.4 (m3u) Crash Vuln PoC
# Title : CoolPlayerPlusPortable 2.19.4 (m3u) crash poc# Date: 2013-01-10# Software http://coolplayer.sourceforge.net/# Author: The Black Devils# Tested on: Windows XP SP2# Greeting To : r0073r /...
View ArticleWordpress ultimate-security-check plugin Full Path Disclosure Vulnerability
# Exploit Title: Wordpress ultimate-security-check plugin Full Path Disclosure vulnerability# Date: 08/01/2012# Author: The Black Devils# Category : [ webapps ]# Type : php# Tested on: [Windows] &...
View Article