me Cookie Monster Eats Data From Sesame Street Store By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:35 GMT Full Article headline hacker cybercrime data loss fraud backdoor
me Surveillance Kits Company Slaps Made In America Sticker On Gear, Selling It To The US Government By packetstormsecurity.com Published On :: Fri, 08 Nov 2019 15:17:20 GMT Full Article headline government usa china fraud cyberwar backdoor
me What The Checkra1n Jailbreak Means For iDevice Security By packetstormsecurity.com Published On :: Fri, 15 Nov 2019 16:11:22 GMT Full Article headline hacker malware phone flaw apple backdoor
me IBM Announces Computer Memory Breakthrough By packetstormsecurity.com Published On :: Fri, 01 Jul 2011 13:54:02 GMT Full Article headline ibm
me IBM Scientists Unveil Racetrack Memory Chip Prototype By packetstormsecurity.com Published On :: Tue, 06 Dec 2011 15:58:38 GMT Full Article headline ibm science
me IBM Warns Of Malware On USB Drives Shipped To Customers By packetstormsecurity.com Published On :: Tue, 02 May 2017 14:10:54 GMT Full Article headline malware ibm
me FBI Sought Interpol Statement Against End To End Crypto By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:01:35 GMT Full Article headline government privacy usa spyware fbi cryptography
me FBI Says Cybercrime Profits Reached $3.5 Billion In 2019 By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:50 GMT Full Article headline cybercrime fraud fbi
me Microsoft-Vietnam Cement Anti-Piracy Deal By packetstormsecurity.com Published On :: Mon, 21 May 2007 19:52:16 GMT Full Article microsoft vietnam
me Would-Be Hacker Vandalizes Vietnam Memorial Site By packetstormsecurity.com Published On :: Thu, 20 Sep 2007 12:17:01 GMT Full Article hacker vietnam
me Vietnamese Security Firm - Your Face Is Easy To Fake By packetstormsecurity.com Published On :: Tue, 02 Dec 2008 12:40:17 GMT Full Article vietnam
me Vietnamese Dissidents Targeted By Botnet Attacks By packetstormsecurity.com Published On :: Wed, 31 Mar 2010 16:53:50 GMT Full Article botnet vietnam
me Vietnamese Government Denies Aurora-Style Hacks By packetstormsecurity.com Published On :: Tue, 06 Apr 2010 13:04:43 GMT Full Article government vietnam
me Feds Charge Vietnamese Suspect With Massive Data Heist By packetstormsecurity.com Published On :: Tue, 22 Oct 2013 14:59:38 GMT Full Article headline government usa cybercrime data loss fraud vietnam
me macOS/iOS IOAccelCommandQueue2::processSegmentKernelCommand() Out-Of-Bounds Timestamp Write By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 16:10:06 GMT macOS and iOS suffers from an out-of-bounds timestamp write in IOAccelCommandQueue2::processSegmentKernelCommand(). Full Article
me macOS / iOS launchd XPC Message Parsing Memory Corruption By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:53:01 GMT launchd on macOS and iOS suffer from a memory corruption issue due to a lack of bounds checking when parsing XPC messages. Full Article
me macOS / iOS ImageIO OpenEXR Image Processing Memory Issues By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 19:19:48 GMT macOS and iOS have a vulnerability with ImageIO where memory safety issues occur when processing OpenEXR images. Full Article
me Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
me RSA Denies Taking $10m To Implement NSA Backdoor By packetstormsecurity.com Published On :: Mon, 23 Dec 2013 14:13:12 GMT Full Article headline flaw backdoor nsa cryptography rsa
me Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 15:36:10 GMT Full Article headline government usa conference cryptography rsa
me John McAfee Now Claims He Has A Spy Ring In The Belize Government By packetstormsecurity.com Published On :: Tue, 08 Jan 2013 04:31:22 GMT Full Article headline government spyware mcafee
me Intel Decides To Rid Itself Of The McAfee Name By packetstormsecurity.com Published On :: Tue, 07 Jan 2014 16:21:01 GMT Full Article headline virus mcafee intel
me When Big Data Becomes Big Brother By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 13:38:04 GMT Full Article headline government privacy spyware mcafee nsa
me Someone Tried To Off John McAfee? By packetstormsecurity.com Published On :: Mon, 24 Jul 2017 13:59:58 GMT Full Article headline mcafee
me Intel Finds Critical Holes In Secret Management Engine By packetstormsecurity.com Published On :: Tue, 21 Nov 2017 18:50:10 GMT Full Article headline flaw mcafee backdoor intel
me Bing.com Hostname / IP Enumerator 1.0 By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:21:05 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
me WebSploit Framework 4.0.1 By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 17:22:22 GMT WebSploit is an advanced man-in-the-middle framework. Full Article
me EnumJavaLibs Java Classpath Enumerator By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:20:32 GMT EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization. Full Article
me 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
me Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
me XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 13:03:33 GMT XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities. Full Article
me Primefaces 5.x Remote Code Execution By packetstormsecurity.com Published On :: Thu, 18 Jan 2018 20:56:41 GMT This Metasploit module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt. Full Article
me No cON Name 2019 Call For Papers By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:21:33 GMT The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019. Full Article
me WhatsApp Axes COVID-19 Mass Message Forwarding By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 15:36:16 GMT Full Article headline facebook
me Linux/x86 Execve() Alphanumeric Shellcode By packetstormsecurity.com Published On :: Sat, 04 Jan 2020 13:02:22 GMT 66 bytes small Linux/x86 Execve() alphanumeric shellcode. Full Article
me Google Chrome 80 JSCreate Side-Effect Type Confusion By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:45:47 GMT This Metasploit module exploits an issue in Google Chrome version 80.0.3987.87 (64 bit). The exploit corrupts the length of a float array (float_rel), which can then be used for out of bounds read and write on adjacent memory. The relative read and write is then used to modify a UInt64Array (uint64_aarw) which is used for read and writing from absolute memory. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, so the browser must be run with the --no-sandbox option for the payload to work correctly. Full Article
me Dynamic MessageBoxA||W PEB And Import Table Method Shellcode By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:10:48 GMT 232 bytes small Dynamic MessageBoxA||W PEB and Import Table Method shellcode. Full Article
me Virgin Media Learns About Poor Outsourcing Decisions By packetstormsecurity.com Published On :: Fri, 04 Mar 2016 16:02:25 GMT Full Article headline india flaw cryptography
me Indian Police Arrest Four For Game Of Thrones Leak By packetstormsecurity.com Published On :: Tue, 15 Aug 2017 13:31:45 GMT Full Article headline hacker india data loss
me Data Of Nearly 700,000 Amex India Customers Exposed Via Unsecured MongoDB Server By packetstormsecurity.com Published On :: Wed, 07 Nov 2018 16:32:01 GMT Full Article headline privacy bank india cybercrime data loss fraud
me Indian Government Confirms Cyberattack On Nuclear Plant By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:55 GMT Full Article headline government india cyberwar
me Google Now Charges The Government For User Data Requests By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:45:22 GMT Full Article headline government privacy usa data loss google spyware
me Google Denies Harvesting Student Data With Free Chromebooks By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:50 GMT Full Article headline privacy data loss google
me Google Patches Dangerous MediaTek Flaw For Tons Of Phones By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 14:01:21 GMT Full Article headline phone flaw google patch
me FIBARO System Home Center 5.021 Remote File Inclusion / XSS By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:12:32 GMT FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities. Full Article
me LimeSurvey 4.1.11 Path Traversal By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 19:22:22 GMT LimeSurvey version 4.1.11 suffers from a File Manager path traversal vulnerability. Full Article
me Little Town in Romania Is Cybercrime Central By packetstormsecurity.com Published On :: Tue, 15 Feb 2011 15:30:24 GMT Full Article headline cybercrime romania
me NASA Hacker Refuses To Pay Compensation To US Government By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 13:38:01 GMT Full Article headline hacker government usa romania
me International Raids Arrest 110 Players In Investment Fraud Schemes By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 21:38:14 GMT Full Article headline hacker usa britain cybercrime fraud scam spain romania
me Meet The Hackers Who Drive The Porsches You Pay For By packetstormsecurity.com Published On :: Mon, 26 Sep 2016 14:03:58 GMT Full Article headline hacker cybercrime fraud romania