an Chinese APT Now Leveraging Pulse And Fortinet VPN Servers By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 13:39:37 GMT Full Article headline hacker privacy china flaw cyberwar backdoor cryptography
an Telnet Backdoor Opens More Than 1M IoT Radios To Hijack By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:20 GMT Full Article headline flaw backdoor
an Advanced Hackers Are Infecting IT Providers To Get At Customers By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 14:54:56 GMT Full Article headline hacker malware backdoor
an Sophisticated Spy Kit Targets Russians With Rare GSM Plugin By packetstormsecurity.com Published On :: Fri, 11 Oct 2019 14:57:10 GMT Full Article headline malware phone russia cyberwar spyware backdoor
an Magecart Gang Targets Skin Care Site Visitors For 5+ Months By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:09 GMT Full Article headline cybercrime fraud backdoor
an Surveillance Kits Company Slaps Made In America Sticker On Gear, Selling It To The US Government By packetstormsecurity.com Published On :: Fri, 08 Nov 2019 15:17:20 GMT Full Article headline government usa china fraud cyberwar backdoor
an New Titanium Backdoor Debuted By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:44 GMT Full Article headline hacker malware backdoor
an What The Checkra1n Jailbreak Means For iDevice Security By packetstormsecurity.com Published On :: Fri, 15 Nov 2019 16:11:22 GMT Full Article headline hacker malware phone flaw apple backdoor
an CES Surveillance Hype Worries Privacy Advocates By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:50:34 GMT Full Article headline government privacy usa fraud spyware backdoor
an IBM And Verizon Take Security To The Cloud By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 09:48:34 GMT Full Article ibm
an IBM Announces Computer Memory Breakthrough By packetstormsecurity.com Published On :: Fri, 01 Jul 2011 13:54:02 GMT Full Article headline ibm
an Hands-On With The IBM 5150, Thirty Years Later By packetstormsecurity.com Published On :: Fri, 12 Aug 2011 13:46:42 GMT Full Article headline ibm science
an IBM: Mind Reading Is Less Than Five Years Away. For Real. By packetstormsecurity.com Published On :: Mon, 19 Dec 2011 16:26:06 GMT Full Article headline ibm science
an IBM Warns Storwize Arrays Can Delete All Data By packetstormsecurity.com Published On :: Mon, 28 Oct 2013 15:03:58 GMT Full Article headline ibm data loss flaw apache
an Cisco And Others Take A Hit In China Due To Spy Scandal By packetstormsecurity.com Published On :: Fri, 15 Nov 2013 03:12:09 GMT Full Article headline government microsoft ibm usa china cisco spyware nsa
an Lawsuit Accuses IBM Of Hiding China Risks Amid NSA Spy Scandal By packetstormsecurity.com Published On :: Fri, 13 Dec 2013 16:02:27 GMT Full Article headline government ibm usa china cyberwar spyware
an IBM: Heartbleed Attacks Thousands Of Servers Daily By packetstormsecurity.com Published On :: Wed, 27 Aug 2014 15:23:38 GMT Full Article headline hacker ibm flaw cryptography
an FBI, ICE Plunder DMV Driver Database For Facial Recognition Scans By packetstormsecurity.com Published On :: Mon, 08 Jul 2019 14:35:03 GMT Full Article headline government privacy usa spyware fbi
an FBI Program Offers Companies Data Protection Via Deception By packetstormsecurity.com Published On :: Sat, 21 Dec 2019 06:48:46 GMT Full Article headline government usa fraud fbi
an Microsoft-Vietnam Cement Anti-Piracy Deal By packetstormsecurity.com Published On :: Mon, 21 May 2007 19:52:16 GMT Full Article microsoft vietnam
an Would-Be Hacker Vandalizes Vietnam Memorial Site By packetstormsecurity.com Published On :: Thu, 20 Sep 2007 12:17:01 GMT Full Article hacker vietnam
an Nigerian Hacker Hunted In Vietnam By packetstormsecurity.com Published On :: Mon, 29 Oct 2007 10:48:32 GMT Full Article hacker britain vietnam
an North Korean State Hackers Target Retired Diplomats And Military Officials By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 15:11:04 GMT Full Article headline hacker government cyberwar korea military
an TrickBot Gang Is Now Supplying North Korea By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:43:58 GMT Full Article headline government malware cyberwar korea
an macOS/iOS IOAccelCommandQueue2::processSegmentKernelCommand() Out-Of-Bounds Timestamp Write By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 16:10:06 GMT macOS and iOS suffers from an out-of-bounds timestamp write in IOAccelCommandQueue2::processSegmentKernelCommand(). Full Article
an File Sharing And Chat 1.0 Denial Of Service By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:54:09 GMT File Sharing and Chat version 1.0 for iOS suffers from a denial of service vulnerability. Full Article
an Transfer Master 3.3 Denial Of Service By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:58:27 GMT Transfer Master version 3.3 for iOS suffers from a denial of service vulnerability. Full Article
an Google And Mozilla Move To Stop Kazakhstan Snooping By packetstormsecurity.com Published On :: Wed, 21 Aug 2019 19:31:37 GMT Full Article headline government privacy google mozilla firefox cryptography
an Mozilla Patches Eleven Vulnerabilities In Firefox 71 And ESR 68.3 By packetstormsecurity.com Published On :: Fri, 06 Dec 2019 16:13:49 GMT Full Article headline flaw patch mozilla firefox
an Crypto Boffins: RSA Tokens Can Be Cracked In 13 Minutes By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:22 GMT Full Article headline flaw science cryptography rsa
an Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
an NSA Infiltrated RSA Security More Deeply Than Thought By packetstormsecurity.com Published On :: Mon, 31 Mar 2014 14:37:20 GMT Full Article headline government usa backdoor nsa cryptography rsa
an RSA Ties To NSA Go Deeper Than Thought By packetstormsecurity.com Published On :: Tue, 01 Apr 2014 14:05:22 GMT Full Article headline government spyware backdoor nsa cryptography rsa
an RSA Boss Packs His Fishing Rod And Heads For The Hills By packetstormsecurity.com Published On :: Wed, 04 Feb 2015 14:55:59 GMT Full Article headline backdoor nsa rsa
an RSA Bans Booth Babes By packetstormsecurity.com Published On :: Fri, 27 Mar 2015 14:11:24 GMT Full Article headline conference rsa
an John McAfee Announces He's Running For President By packetstormsecurity.com Published On :: Wed, 09 Sep 2015 05:35:06 GMT Full Article headline government usa mcafee
an John McAfee Offers To Crack San Bernardino Shooter's iPhone By packetstormsecurity.com Published On :: Fri, 19 Feb 2016 01:27:07 GMT Full Article headline phone password apple mcafee fbi
an McAfee Anti-Hacking Service Exposed Users To Banking Malware By packetstormsecurity.com Published On :: Thu, 16 Nov 2017 15:05:23 GMT Full Article headline malware bank cybercrime fraud flaw identity theft mcafee
an Intel Finds Critical Holes In Secret Management Engine By packetstormsecurity.com Published On :: Tue, 21 Nov 2017 18:50:10 GMT Full Article headline flaw mcafee backdoor intel
an John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
an Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
an Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
an Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
an Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
an Wapiti Web Application Vulnerability Scanner 3.0.2 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:02 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
an Wapiti Web Application Vulnerability Scanner 3.0.3 By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:41:20 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
an 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
an Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
an Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
an Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article