k Intel Touts Bug Bounties To Hardware Hackers By packetstormsecurity.com Published On :: Fri, 17 Mar 2017 00:38:32 GMT Full Article headline hacker flaw mcafee
k McAfee Anti-Hacking Service Exposed Users To Banking Malware By packetstormsecurity.com Published On :: Thu, 16 Nov 2017 15:05:23 GMT Full Article headline malware bank cybercrime fraud flaw identity theft mcafee
k John McAfee Says His Twitter Account Was Hacked By packetstormsecurity.com Published On :: Thu, 28 Dec 2017 15:49:52 GMT Full Article headline fraud mcafee twitter
k John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
k Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
k Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
k Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
k Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
k WebSploit Framework 4.0.1 By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 17:22:22 GMT WebSploit is an advanced man-in-the-middle framework. Full Article
k Linux/x86 execve(/bin/sh) Socket Reuse Shellcode By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:18:16 GMT 42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode. Full Article
k 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
k Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
k RSA BSAFE Crypto Attacks / Denial Of Service By packetstormsecurity.com Published On :: Mon, 17 Aug 2015 16:07:08 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C all suffer from various crypto, denial of service, and underflow vulnerabilities. Full Article
k XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 13:03:33 GMT XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities. Full Article
k XOOPS 2.5.7.2 Weak Crypto By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 22:22:22 GMT XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database. Full Article
k RSA BSAFE Lenstra's Attack By packetstormsecurity.com Published On :: Mon, 11 Apr 2016 22:06:11 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, and SSL-J contain a fix to address Lenstra's attack. RSA BSAFE Micro Edition Suite (MES) 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.1.3, RSA BSAFE Crypto-J 6.2.1, and RSA BSAFE SSL-J 6.2.1 are affected. Full Article
k Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 27 Jul 2017 18:22:22 GMT Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities. Full Article
k Key Reinstallation: Forcing Nonce Reuse In WPA2 By packetstormsecurity.com Published On :: Mon, 16 Oct 2017 13:34:29 GMT Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected. Full Article
k Android Securty Research: Crypto Local Storage Attack By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 20:22:22 GMT Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack. Full Article
k Positive Hack Days 10 Call For Papers By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 20:32:22 GMT Call For Papers for Positive Hack Days 10 which will take place in Moscow, Russia May 13th through the 14th, 2020. Full Article
k LeHACK 2020 Call For Papers By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:12:37 GMT LeHACK 2020 is a yearly rendezvous where hackers and aficionados are meeting with both technical and non-technical talks and workshops about hacking. It is a great place to discover, to learn, to teach and be taught in the magical city of Paris. LeHACK 2020 will be held in La Cite des Sciences et de l'Industire in Paris, France from June 26th through the 27th, 2020. Full Article
k Millions Of Facebook User Phone Numbers Exposed Online, Researchers Say By packetstormsecurity.com Published On :: Thu, 19 Dec 2019 17:23:52 GMT Full Article headline privacy phone data loss flaw facebook social
k Facebook Cracks Down On Deepfake Videos By packetstormsecurity.com Published On :: Tue, 07 Jan 2020 16:45:44 GMT Full Article headline fraud facebook
k Facebook To Notify Users Of Third-Party App Logins By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:35 GMT Full Article headline privacy password facebook social
k Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
k Facebook's New Privacy Tool Lets You Manage How You're Tracked By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:48 GMT Full Article headline privacy facebook social
k Flaws In WhatsApp's Desktop App Allowed Remote Access To Files By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:28 GMT Full Article headline privacy data loss flaw facebook
k Facebook Sues SDK Maker For Secretly Harvesting User Data By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:36 GMT Full Article headline privacy data loss facebook
k Facebook Sued By Australian Information Watchdog Over Cambridge Analytica-Linked Data Breach By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 15:01:39 GMT Full Article headline government privacy australia data loss facebook
k BlackBerry GIves Indian Spooks BBM And BIS Access By packetstormsecurity.com Published On :: Thu, 11 Jul 2013 14:51:15 GMT Full Article headline government privacy india blackberry
k Indian Spooks Snooping Without ISP Knowledge By packetstormsecurity.com Published On :: Mon, 09 Sep 2013 15:11:50 GMT Full Article headline government privacy india spyware
k Inside The TalkTalk 'Indian Scam Call Center' By packetstormsecurity.com Published On :: Mon, 06 Mar 2017 16:18:26 GMT Full Article headline india cybercrime fraud scam
k McDonald's India Delivery App Leaks User Data By packetstormsecurity.com Published On :: Mon, 20 Mar 2017 15:46:49 GMT Full Article headline privacy phone india data loss
k Indian Police Arrest Four For Game Of Thrones Leak By packetstormsecurity.com Published On :: Tue, 15 Aug 2017 13:31:45 GMT Full Article headline hacker india data loss
k Aadhaar: Leak In World's Biggest Database Worries Indians By packetstormsecurity.com Published On :: Fri, 05 Jan 2018 15:50:02 GMT Full Article headline government privacy india data loss
k Bogus MDM System Used To Hack iPhones In India By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 15:57:49 GMT Full Article headline malware phone india fraud apple
k Hackers Steal $13.5 Million In Cosmos Bank Heist By packetstormsecurity.com Published On :: Mon, 27 Aug 2018 13:47:03 GMT Full Article headline hacker malware bank india cybercrime fraud
k New North Korean Malware Targeting ATMs Spotted In India By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:52:35 GMT Full Article headline bank india cybercrime fraud cyberwar korea
k Indian Government Confirms Cyberattack On Nuclear Plant By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:55 GMT Full Article headline government india cyberwar
k Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:03 GMT Full Article headline hacker flaw google
k Google Denies Harvesting Student Data With Free Chromebooks By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:50 GMT Full Article headline privacy data loss google
k Google Patches Dangerous MediaTek Flaw For Tons Of Phones By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 14:01:21 GMT Full Article headline phone flaw google patch
k Cookiethief Android Malware Hijacks Facebook Accounts By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 13:12:43 GMT Full Article headline malware phone google facebook
k $100k Paid Out For Google Cloud Shell Root Compromise By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:12 GMT Full Article headline hacker flaw google
k Google Data Shines Light On Whether Coronavirus Lockdowns Worldwide Are Working By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:27 GMT Full Article headline privacy virus google
k SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:49:06 GMT SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks. Full Article
k DotNetNuke CMS 9.4.4 Zip Directory Traversal By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:21:21 GMT DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code. Full Article
k PHPKB Multi-Language 9 Authenticated Directory Traversal By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:56:01 GMT PHPKB Multi-Language 9 suffers from an authenticated directory traversal vulnerability. Full Article
k Joomla Fabrik 3.9.11 Directory Traversal By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:44:08 GMT Joomla Fabrik component version 3.9.11 suffers from a directory traversal vulnerability. Full Article
k Booked Scheduler 2.7.7 Directory Traversal By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:37:26 GMT Booked Scheduler version 2.7.7 suffers from an authenticated directory traversal vulnerability. Full Article