is Czech Authorities Dismantle Alleged Russian Spy Network By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:09:51 GMT Full Article headline government russia cyberwar spyware
is Read Tim Morrison's NSC Impeachment Testimony By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:01:48 GMT Full Article headline government usa russia fraud
is U.S. Military Tests Missile Previously Banned Under Treaty By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:23 GMT Full Article headline government usa russia military
is ScanGuard Antivirus Insecure Permissions By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:22:05 GMT Scanguard versions through 2019-11-12 on Windows has insecure permissions for the installation directory, leading to privilege escalation via a trojan horse executable file. Full Article
is Sophisticated Spy Kit Targets Russians With Rare GSM Plugin By packetstormsecurity.com Published On :: Fri, 11 Oct 2019 14:57:10 GMT Full Article headline malware phone russia cyberwar spyware backdoor
is Magecart Gang Targets Skin Care Site Visitors For 5+ Months By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:09 GMT Full Article headline cybercrime fraud backdoor
is This App Will Tell You If Your iPhone Gets Hacked By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:47 GMT Full Article headline hacker phone apple backdoor
is IBM Reports Huge Rise In Malicious Links By packetstormsecurity.com Published On :: Wed, 26 Aug 2009 22:20:09 GMT Full Article ibm
is IBM Threat Report Highlights Data Risks By packetstormsecurity.com Published On :: Fri, 26 Feb 2010 17:11:06 GMT Full Article ibm
is IBM Scientists Unveil Racetrack Memory Chip Prototype By packetstormsecurity.com Published On :: Tue, 06 Dec 2011 15:58:38 GMT Full Article headline ibm science
is IBM: Mind Reading Is Less Than Five Years Away. For Real. By packetstormsecurity.com Published On :: Mon, 19 Dec 2011 16:26:06 GMT Full Article headline ibm science
is Cisco And Others Take A Hit In China Due To Spy Scandal By packetstormsecurity.com Published On :: Fri, 15 Nov 2013 03:12:09 GMT Full Article headline government microsoft ibm usa china cisco spyware nsa
is Lawsuit Accuses IBM Of Hiding China Risks Amid NSA Spy Scandal By packetstormsecurity.com Published On :: Fri, 13 Dec 2013 16:02:27 GMT Full Article headline government ibm usa china cyberwar spyware
is IG Report Says FBI Justified In Starting Russia Probe, Barr Disagrees By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 14:57:50 GMT Full Article headline government usa russia fraud cyberwar fbi
is Secret Judge Orders FBI To Reform FISA Process By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 13:57:14 GMT Full Article headline government privacy usa fbi
is Vietnamese Security Firm - Your Face Is Easy To Fake By packetstormsecurity.com Published On :: Tue, 02 Dec 2008 12:40:17 GMT Full Article vietnam
is Vietnamese Dissidents Targeted By Botnet Attacks By packetstormsecurity.com Published On :: Wed, 31 Mar 2010 16:53:50 GMT Full Article botnet vietnam
is US Slams Vietnam Censorship Despite PRISM Hypocrisy By packetstormsecurity.com Published On :: Tue, 06 Aug 2013 14:48:23 GMT Full Article headline government privacy usa vietnam nsa censorship
is Feds Charge Vietnamese Suspect With Massive Data Heist By packetstormsecurity.com Published On :: Tue, 22 Oct 2013 14:59:38 GMT Full Article headline government usa cybercrime data loss fraud vietnam
is EFF Claims Vietnam Is Performing Spear Phishing By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:32 GMT Full Article headline government fraud phish vietnam
is TrickBot Gang Is Now Supplying North Korea By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:43:58 GMT Full Article headline government malware cyberwar korea
is macOS / iOS ImageIO OpenEXR Image Processing Memory Issues By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 19:19:48 GMT macOS and iOS have a vulnerability with ImageIO where memory safety issues occur when processing OpenEXR images. Full Article
is SuperBackup 2.0.5 Persistent Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:29:35 GMT SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability. Full Article
is AirDisk Pro 5.5.3 Persistent Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:39:20 GMT AirDisk Pro version 5.5.3 for iOS suffers from multiple persistent cross site scripting vulnerabilities. Full Article
is Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
is Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
is RSA Boss Packs His Fishing Rod And Heads For The Hills By packetstormsecurity.com Published On :: Wed, 04 Feb 2015 14:55:59 GMT Full Article headline backdoor nsa rsa
is RSA Conference Registration Page Collecting Twitter Credentials By packetstormsecurity.com Published On :: Fri, 22 Jan 2016 14:27:30 GMT Full Article headline data loss flaw password twitter conference rsa
is Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 15:36:10 GMT Full Article headline government usa conference cryptography rsa
is McAfee Discovers Adobe Reader Security Flaw By packetstormsecurity.com Published On :: Tue, 30 Apr 2013 00:02:38 GMT Full Article headline flaw adobe mcafee
is Microsoft / McAfee Move To Gut Superfish From Lenovo Laptops By packetstormsecurity.com Published On :: Mon, 23 Feb 2015 15:28:43 GMT Full Article headline malware microsoft china mcafee backdoor cryptography
is McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
is John McAfee Says His Twitter Account Was Hacked By packetstormsecurity.com Published On :: Thu, 28 Dec 2017 15:49:52 GMT Full Article headline fraud mcafee twitter
is John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
is Lynis Auditing Tool 2.7.5 By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 23:28:32 GMT Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. Full Article
is Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
is FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
is Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
is Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
is Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
is Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
is Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
is Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
is Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
is BSidesLisbon 2019 Call For Papers By packetstormsecurity.com Published On :: Sat, 24 Aug 2019 10:21:11 GMT BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL. Full Article
is Russian Disinformation Ongoing Problem, Says FBI Chief By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:27:36 GMT Full Article headline government usa russia fraud cyberwar facebook social fbi
is Coronavirus Conspiracies Go Viral On WhatsApp As Crisis Deepens By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:47 GMT Full Article headline virus fraud facebook
is BlackBerry GIves Indian Spooks BBM And BIS Access By packetstormsecurity.com Published On :: Thu, 11 Jul 2013 14:51:15 GMT Full Article headline government privacy india blackberry
is Malicious Snoopware Targeting India Found At Tiny Midwest ISP By packetstormsecurity.com Published On :: Thu, 08 Aug 2013 03:40:51 GMT Full Article headline malware india cyberwar pakistan
is Indian Spooks Snooping Without ISP Knowledge By packetstormsecurity.com Published On :: Mon, 09 Sep 2013 15:11:50 GMT Full Article headline government privacy india spyware