co How Coronavirus Sentiment And Behavior Has Changed By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:43 GMT Full Article headline government science
co AI Cannot Be Recognized As An Inventor, US Rules By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:43 GMT Full Article headline government usa science
co State-Backed Hackers Are Trying To Steal Coronavirus Research By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:00 GMT Full Article headline hacker government virus science
co FreeBSD Project Reveals Servers Were Compromised By packetstormsecurity.com Published On :: Mon, 19 Nov 2012 16:04:03 GMT Full Article headline hacker data loss bsd backdoor
co Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys By packetstormsecurity.com Published On :: Tue, 26 Mar 2013 15:15:25 GMT Full Article headline flaw bsd cryptography
co Labour Party Confirms Cyber Attack Was DDoS By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:15 GMT Full Article headline government britain denial of service
co Arron Banks' Twitter Account Hacked By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:01:40 GMT Full Article headline hacker government britain twitter
co Travelex Suspends Services Post Malware Discovery By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:15:15 GMT Full Article headline malware britain
co UK Financial Watchdog Leaked Confidential Consumer Data By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:10 GMT Full Article headline government privacy britain data loss
co Loyalty Cards Targeted In Tesco Clubcard Attack By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:27 GMT Full Article headline hacker britain data loss fraud
co UK Coronavirus App Must Respect Privacy Rights By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:48 GMT Full Article headline privacy virus phone britain
co UK Privacy Advocates Warn Over COVID-19 Contact Tracing App By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:42 GMT Full Article headline government privacy virus phone britain
co Alleged Computer Hacker Granted Bail By packetstormsecurity.com Published On :: Wed, 23 Sep 2009 04:58:22 GMT Full Article hacker caribbean
co Look Who's Joined The Anti-Encryption Posse: Germany, Come On Down By packetstormsecurity.com Published On :: Fri, 16 Jun 2017 14:11:25 GMT Full Article headline government privacy usa britain germany backdoor cryptography
co German Police Handed Hacking Powers To Bypass Encrypted Communications By packetstormsecurity.com Published On :: Sat, 24 Jun 2017 16:49:10 GMT Full Article headline government privacy phone germany spyware backdoor cryptography
co German e-Gov Protocol Carries Ancient Vulns By packetstormsecurity.com Published On :: Mon, 03 Jul 2017 15:44:14 GMT Full Article headline government flaw germany
co Tele Columbus Confirms Hacker Attack On Customers By packetstormsecurity.com Published On :: Mon, 06 Nov 2017 14:23:02 GMT Full Article headline hacker privacy phone data loss germany
co Codebreaking Bombe Moves To Computer Museum By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:50:02 GMT Full Article headline britain cyberwar germany cryptography
co Code-Cracking WW2 Bombe Operation Recreated At Bletchley By packetstormsecurity.com Published On :: Mon, 24 Sep 2018 23:34:48 GMT Full Article headline britain cyberwar germany science cryptography
co 20 Year Old Man Confesses In German Data Leak By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:41 GMT Full Article headline hacker government privacy data loss germany
co German Cartel Office To Take Facebook Case To Highest Court By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:25:48 GMT Full Article headline government privacy data loss fraud germany identity theft facebook
co Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
co How Does IS Communicate Securely? By packetstormsecurity.com Published On :: Tue, 17 Nov 2015 16:53:15 GMT Full Article headline government spyware france terror cryptography
co French Cybercops Dismantle Pirate Computer Network By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 15:11:00 GMT Full Article headline hacker government cybercrime botnet fraud france
co Yves Rocher Cosmetic Company Leaks Data On Millions By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 15:58:43 GMT Full Article headline hacker privacy data loss france
co French Hospital Contracts 6,000 PC-Locking Ransomware Infections By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:15 GMT Full Article headline malware cybercrime fraud france terror cryptography
co Imperial College COVID-19 Response Team Report By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 17:09:42 GMT The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks. Full Article
co Air Contacts Lite Denial Of Service By packetstormsecurity.com Published On :: Thu, 10 Mar 2011 22:42:22 GMT The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability. Full Article
co Twitter 5.0 Eavesdropping Proof Of Concept By packetstormsecurity.com Published On :: Thu, 22 Nov 2012 18:22:22 GMT The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included. Full Article
co Air Disk Wireless 1.9 LFI / Command Injection By packetstormsecurity.com Published On :: Fri, 08 Feb 2013 03:40:19 GMT Air Disk Wireless version 1.9 for iPad and iPhone suffers from local file inclusion and command injection vulnerabilities. Full Article
co Transferable Remote 1.1 XSS / LFI / Command Injection By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 03:00:01 GMT Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities. Full Article
co Video: Wikileaks Rears Its Head In Cohen Testimony Against Trump By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 03:03:48 GMT Full Article headline government email usa britain russia data loss fraud
co 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
co Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
co Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
co Exim Command Execution Flaw Affects Millions Of Servers By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 15:06:13 GMT Full Article headline email flaw
co Microsoft Warns Of Email Attacks Executing Code Using An Old Bug By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 14:55:53 GMT Full Article headline malware microsoft email flaw
co Ex-Yahoo Engineer Hacked Accounts Seeking Porn By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:49:58 GMT Full Article headline hacker privacy email cybercrime fraud password yahoo
co Apple Mail On macOS Leaves Parts Of Encrypted Emails In Clear By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:41 GMT Full Article headline privacy email flaw apple cryptography
co Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
co Linux/x86 Bind Shell Generator Shellcode By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 01:11:11 GMT 114 bytes small Linux/x86 bind shell generator shellcode. Full Article
co qdPM Remote Code Execution By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 22:43:25 GMT qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution. Full Article
co Cacti 1.2.8 Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:42:06 GMT graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. Full Article
co Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
co Metasploit Libnotify Arbitrary Command Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:36:46 GMT This Metasploit module exploits a shell command injection vulnerability in the libnotify plugin. This vulnerability affects Metasploit versions 5.0.79 and earlier. Full Article
co Linux/x86 Reverse Shell Generator Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:32:22 GMT 80 bytes small Linux/x86 reverse shell generator shellcode with customizable TCP port and IP address. Full Article
co TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
co IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
co Island Economies of the Future 2019/20 – the results By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:26:23 +0000 Cyprus is ranked first in fDi’s Island Economies of the Future rankings, followed by the Dominican Republic and Sri Lanka. Cathy Mullan and Naomi Davies detail the results. Full Article
co Russia most diversified commodity economy for the fourth year By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:45 +0000 Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports. Full Article