y Police Bust Man For Selling 1 Million Netflix, Spotify Passwords By packetstormsecurity.com Published On :: Wed, 13 Mar 2019 14:20:00 GMT Full Article headline government australia cybercrime data loss fraud password
y Lime Scooters Hacked In Australia To Say Sexual Things By packetstormsecurity.com Published On :: Wed, 24 Apr 2019 13:42:19 GMT Full Article headline hacker australia
y Australia's Cybersecurity Chief Alastair MacGibbon Resigns By packetstormsecurity.com Published On :: Mon, 06 May 2019 13:41:48 GMT Full Article headline government australia
y Australian National University Hit By Huge Data Breach By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 15:06:21 GMT Full Article headline privacy australia data loss
y Creepy - The RFID Urn Retrieval System By packetstormsecurity.com Published On :: Tue, 19 Aug 2008 19:35:21 GMT Full Article rfid
y Mythbusters RFID Episode Axed After Pressure From Credit Card Firms By packetstormsecurity.com Published On :: Wed, 03 Sep 2008 00:43:56 GMT Full Article bank rfid
y Are RFID Chips A Personal Security Risk? By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 13:42:53 GMT Full Article rfid
y D-Day For RFID-Based Transit Card Systems By packetstormsecurity.com Published On :: Mon, 06 Oct 2008 12:26:58 GMT Full Article rfid
y European Commission Launches New Industry Guidelines On RFID Privacy By packetstormsecurity.com Published On :: Thu, 07 Apr 2011 05:05:29 GMT Full Article headline rfid
y Anonymous Takes Down Texan RFID-Tracking School By packetstormsecurity.com Published On :: Tue, 27 Nov 2012 06:11:09 GMT Full Article headline government privacy rfid anonymous
y Hacking RFID Tags Is Easier Than You Think By packetstormsecurity.com Published On :: Fri, 02 Aug 2013 14:34:42 GMT Full Article headline hacker wireless rfid conference
y Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
y Microsoft Twitter Accounts Hit Again By Syrian Electronic Army By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:33:03 GMT Full Article headline hacker microsoft twitter syria
y Syrian Electronic Army Gets Dose Of Own Medicine By packetstormsecurity.com Published On :: Wed, 15 Jan 2014 16:26:13 GMT Full Article headline hacker syria
y Microsoft In More Hacking Misery By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:20 GMT Full Article headline hacker microsoft flaw syria
y Syrian Electronic Army Claims CNN As Its Latest Victim By packetstormsecurity.com Published On :: Fri, 24 Jan 2014 16:14:29 GMT Full Article headline hacker syria
y Hacktivists Dish Out DNS Hijack To PayPal, eBay By packetstormsecurity.com Published On :: Tue, 04 Feb 2014 00:00:19 GMT Full Article headline hacker dns ebay syria
y Syria's Internet Goes Dark For Several Hours By packetstormsecurity.com Published On :: Fri, 21 Mar 2014 23:40:22 GMT Full Article headline government facebook twitter syria censorship
y Syrian Malware Team Found Spewing Dark Edition BlackWorm RAT By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:10 GMT Full Article headline hacker malware cybercrime fraud syria
y Second Hacking Crew Joins Syrian Electronic Army On Team Assad By packetstormsecurity.com Published On :: Tue, 02 Sep 2014 06:15:46 GMT Full Article headline hacker government syria
y UK Spy Drones To Fly Over Syria By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 21:58:00 GMT Full Article headline government britain cyberwar spyware syria
y Study: Hack Attack Aimed At ISIS' Opposition By packetstormsecurity.com Published On :: Sat, 20 Dec 2014 15:56:54 GMT Full Article headline cyberwar iraq terror syria
y Fake 'Femme Fatales' Aid Syrian Battle Hack By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 16:28:04 GMT Full Article headline cyberwar syria
y France Fingered As Source Of Syria-Spying Babar Malware By packetstormsecurity.com Published On :: Fri, 06 Mar 2015 14:25:28 GMT Full Article headline government privacy malware spyware france syria
y US Army Website Defaced By Syrian Electronic Army By packetstormsecurity.com Published On :: Tue, 09 Jun 2015 13:30:43 GMT Full Article headline hacker government usa cyberwar syria
y Russian Plane Crash Possibly Fault Of ISIS Bomb By packetstormsecurity.com Published On :: Thu, 05 Nov 2015 00:55:41 GMT Full Article headline russia terror syria
y Syrian Electronic Army Hacker Suspects Charged By packetstormsecurity.com Published On :: Wed, 23 Mar 2016 13:59:59 GMT Full Article headline hacker government usa fbi syria
y Guilty Plea For Syrian Electronic Army Accomplice By packetstormsecurity.com Published On :: Fri, 30 Sep 2016 14:28:46 GMT Full Article headline hacker malware cybercrime fraud germany syria
y European Surveillance Companies Were Eager To Sell Syria Tools Of Oppression By packetstormsecurity.com Published On :: Mon, 12 Dec 2016 17:14:20 GMT Full Article headline government privacy cyberwar spyware syria
y The US Shot Down A Mysterious Enemy Drone Over Syria By packetstormsecurity.com Published On :: Mon, 12 Jun 2017 14:23:08 GMT Full Article headline usa cyberwar syria
y Surgeon Thinks Hack Led To Syrian Air Strike By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 14:00:06 GMT Full Article headline hacker cyberwar syria
y These Hackers Are Using Android Surveillance Malware To Target Opponents Of The Syrian Government By packetstormsecurity.com Published On :: Mon, 10 Dec 2018 15:03:12 GMT Full Article headline hacker government malware fraud spyware syria
y OVP Website Falls To Multiple Hacker Attacks In 1 Day By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 14:31:57 GMT Full Article headline hacker government philippines
y Philippine Police Arrest 357 In Cyber Crime Raid By packetstormsecurity.com Published On :: Sun, 26 Aug 2012 05:44:59 GMT Full Article headline hacker government cybercrime fraud philippines
y Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
y Anonymous Posts Filipino President's Phone Numbers By packetstormsecurity.com Published On :: Mon, 17 Jun 2013 15:15:48 GMT Full Article headline hacker government data loss anonymous philippines
y Mozilla's Firefox 70 Is Out: Privacy Reports Reveal Whose Cookies Are Tracking You By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 18:24:33 GMT Full Article headline privacy spyware mozilla
y GNU Privacy Guard 2.2.14 By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 21:10:07 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y GNU Privacy Guard 2.2.15 By packetstormsecurity.com Published On :: Tue, 26 Mar 2019 15:17:20 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y GNU Privacy Guard 2.2.16 By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:43:38 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
y GNU Privacy Guard 2.2.17 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 03:33:33 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y cryptmount Filesystem Manager 5.3.2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:37:05 GMT cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. Full Article
y GNU Privacy Guard 2.2.18 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:37:46 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y GNU Privacy Guard 2.2.19 By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 16:08:45 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y GNU Privacy Guard 2.2.20 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 15:59:41 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
y Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
y Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
y Avaya IP Office Customer Call Reporter Command Execution By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 23:54:22 GMT This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2. Full Article
y FCKEditor 2.6.8 ASP File Upload Protection Bypass By packetstormsecurity.com Published On :: Wed, 28 Nov 2012 01:33:11 GMT FCKEditor version 2.6.8 ASP version suffers from a file upload protection bypass. Full Article