Archive | December, 2008

sapyto v0.98 Released – SAP Penetration Testing Framework Tool

Find your website's Achilles' Heel


sapyto is the first SAP Penetration Testing Framework, sapyto provides support to information security professionals in SAP platform discovery, investigation and exploitation activities.

sapyto is periodically updated with the outcome of the deep research on the various security aspects in SAP systems.

Although sapyto is a versatile and powerful tool, it is of major importance for it to be used by consultants who are highly skilled and specialized in its usage, preventing any interference with your organization’s usual SAP operation.

New in This Version

This version is mainly a complete re-design of sapyto’s core and architecture to support future releases. Some of the new features now available are:

  • Target configuration is now based on “connectors”, which represent different ways to communicate with SAP services and components. This makes the
    framework extensible to handle new types of connections to SAP platforms.
  • Plugins are now divided in three categories: Discovery, Audit & Exploit.
  • Exploit plugins now generate shells and/or sapytoAgent objects.
  • New plugins!: User account bruteforcing, client enumeration, SAProuter assessment, and more…
  • Plugin-developer interface drastically simplified and improved.
  • New command switches to allow the configuration of targets/scripts/output independently.
  • Installation process and general documentation improved.

You can download sapyto v0.98 here (you may have to fill in a form):

sapyto Public Edition (v0.98)

Or read more here.


Posted in: Database Hacking, Hacking Tools

Tags: , , , , , ,

Posted in: Database Hacking, Hacking Tools | Add a Comment
Recent in Database Hacking:
- Onapsis Bizploit v1.50 – SAP Penetration Testing Framework
- OAT – Oracle Auditing Tools For Database Security
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security

Related Posts:

Most Read in Database Hacking:
- Pangolin – Automatic SQL Injection Tool - 76,369 views
- bsqlbf 1.1 – Blind SQL Injection Tool - 54,381 views
- SQLBrute – SQL Injection Brute Force Tool - 40,914 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Microsoft IE7 Exploit Allows Remote Code Execution on XP & Vista

Your website & network are Hackable


It seems a new, fairly serious flaw has been discovered in Internet Explorer 7 – and as accounts go it’s been around for a couple of months in the underground.

The worrying part is, patch Tuesday was yesterday and after testing it’s been discovered that this flaw WAS NOT patched in the updates.

ISC reports that it’s not currently widely used, but it has been found in the wild.

Microsoft said it is investigating reports that a new exploit is going around that takes advantage of an unpatched security hole in Internet Explorer 7.

The SANS Internet Storm Center, which tracks hacking trends, said today that while the exploit does not appear to be widely in use at the moment, that situation is likely to change soon, since instructions showing criminals how to take advantage of this flaw have been posted online.

SANS emphasizes that this vulnerability is not one that was fixed in the massive bundle of patches that Microsoft issued yesterday. It is not clear what steps users can take to protect themselves against this threat, other than to browse the Web with something other than IE, such as Mozilla Firefox or Opera. This appears to be the type of vulnerability that could be used to give attackers complete control over an affected system merely by convincing users to browse to a specially-crafted hacked or malicious Web site.

It seems the safest thing is not to use IE, which I personally have been doing since about 1998 anyway. But still, some people claim they have problems with Java or JavaScript or AJAX enabled sites with Firefox.

There’s always Opera, or even the new Google Chrome.

This exploit is a serious one as someone only needs to visit the site and remote code can be injected into their OS and executed.

According to SANS, the exploit works against fully-patched Windows XP and Windows 2003 systems with Internet Explorer 7.

In a statement e-mailed to Security Fix, Microsoft said once it is done with its investigation, the company “will take appropriate action to help protect customers. This may include providing a security update through the monthly release process, an out-of-cycle update or additional guidance to help customers protect themselves.”

Once again it’s demonstrated how stupid ‘Patch Tuesday’ is and how half of the people on the Internet are going to be vulnerable to this serious flaw until the first Tuesday in January.

I really hope Microsoft pushes out an emergency patch outside their schedule ASAP.

You can find a list of the sites known to be distributing the code on Shadowserver here.

Source: Security Fix


Posted in: Exploits/Vulnerabilities, Windows Hacking

Tags: , , , , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It
- Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,716 views
- AJAX: Is your application secure enough? - 120,083 views
- eEye Launches 0-Day Exploit Tracker - 85,535 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Secunia Personal Software Inspector (PSI) 1.0

Find your website's Achilles' Heel


To continue with some software targeted towards security and self-protection after posting about Microsoft Baseline Security Analyzer (MBSA) and Microsoft Security Assessment Tool (MSAT) we continue with one more – Secunia Personal Software Inspector. We did write about this software way back when Secunia first came out with their Secunia Software Inspector.

There’s now 3 versions though PSI (Personal), OSI (Online) and NSI (Network). There was an update to the Personal Software Inspector recently (25th Nov. 2008) and it’s now final grade software version 1.0.0.1.

Statistics from the Secunia PSI shows that 98 out of 100 PCs have 1 or more insecure programs installed! Download the free Secunia PSI and check your PC for insecure programs exposing you to security threats!

VULNERABLE ?
Did you know that many of the hacker attacks and security threats today exploit software vulnerabilities and code flaws?

UPDATED ?
Keeping your PC and especially your 3rd party programs updated requires you to search the Internet for updates and patches on a regular basis – for all the programs installed on your PC.

WHATS ON YOUR PC ?
The typical user has 30-60 programs installed – do you know which programs you have installed? Do you know which programs expose you to security threats?

SECURE ?
Is your PC secure? Do you have all the latest security updates and patches?

PROTECT YOURSELF !
Security patches are usually free and available for download from the program vendors. Let the Secunia PSI pinpoint exactly which patches you need to secure your PC.

The Secunia PSI is a free security tool designed with the sole purpose of helping you secure your computer against vulnerabilities in programs.

You can download Secunia PSI v1.0.0.1 here:

PSISetup.exe

Or read more here.


Posted in: Countermeasures, Exploits/Vulnerabilities, Security Software

Tags: , , , , , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Security Software | Add a Comment
Recent in Countermeasures:
- Fully Integrated Defense Operation (FIDO) – Automated Incident Response
- MISP – Malware Information Sharing Platform
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,083 views
- Password Hasher Firefox Extension - 117,768 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,722 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Scammers Using Asterisk VoIP Systems to Make Calls

Find your website's Achilles' Heel


It seems like ‘vishing‘ (basically Phishing – but utilising VoIP call services) as it’s known is getting bigger, especially since the scammers have been using a flaw in Asterisk systems that allows them to hijack the VoIP exchange.

Older versions of Asterisk do have quite a number of serious flaws and it looks like scammers and phishing crews have been exploiting these to make thousands of outbound calls. The traditional way they did this was to setup the exchange themselves so they can receive calls that follow-up to their phishing e-mails.

Criminals are taking advantage of a bug in the Asterisk Internet telephony system that lets them pump out thousands of scam phone calls in an hour, the U.S. Federal Bureau of Investigation warned Friday.

The FBI didn’t say which versions of Asterisk were vulnerable to the bug, but it advised users to upgrade to the latest version of the software. Asterisk is an open-source product that lets users turn a Linux computer into a VoIP (Voice over Internet Protocol) telephone exchange.

In so-called vishing attacks, scammers usually use a VoIP system to set up a phony call center and then use phishing e-mails to trick victims into calling the center. Once there, they are prompted to give private information. But in the scam described by the FBI, they apparently are taking over legitimate Asterisk systems in order to directly dial victims.

So if you are running any kind of Asterisk exchange or derivative (even a hardware based VoIP device based on Asterisk) please make sure you’ve updated to the latest version (this includes firmware for hardware devices).

If not you might find yourself with a very large phone bill that’s hard to explain.

“Early versions of the Asterisk software are known to have a vulnerability,” the FBI said in an advisory posted Friday to the Internet Crime Complaint Center. “The vulnerability can be exploited by cyber criminals to use the system as an auto dialer, generating thousands of vishing telephone calls to consumers within one hour.”

The software, developed by Digium, has been available for nearly a decade, and a number of critical flaws have been found in the software. In March, researchers at Mu Security reported a bug that could allow an attacker to take control of an Asterisk system.

With the digital nature of Asterisk it’s very easy to dial out then play back a mp3 or wav file that was pre-recorded by the phisher.

They don’t need to take a lot of effort to do this, I imagine they just write a script that auto-generates the phone numbers to dial – then away it goes. Whatever the victim needs to do will be contained within the voice message.

I can’t believe people still fall for these things, but well they do.

Source: Network World


Posted in: Exploits/Vulnerabilities, Phishing, Social Engineering

Tags: , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Phishing, Social Engineering | Add a Comment
Recent in Exploits/Vulnerabilities:
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It
- Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,716 views
- AJAX: Is your application secure enough? - 120,083 views
- eEye Launches 0-Day Exploit Tracker - 85,535 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


The World’s Fastest MD5 Cracker – BarsWF

Find your website's Achilles' Heel


BarsWF is basically an MD5 cracking tool and at the moment, is currently the fastest. Right now on nVidia 9600GT/C2D 3Ghz CUDA version does 350 M keys/sec, SSE2 version does 108 M keys/sec. You may check benchmarks of all known good MD5 bruteforcers here.

Changes in 0.8

  • Added checks for errors when calling CUDA kernel.
  • Now you can specify custom characters for charset using -X switch.
  • You may specify minimal password length using -min_len.
  • Save/restore feature added. State is being stored to barswf.save every 5 minutes or on exit. You may continue computation using -r switch. You may manually edit .save file to distribute job on several computers (but this is up to you – it is quite simple and non-documented ). BarsWF will also write found password into barswf.save at the end.
  • Improved speed for cards GTX260, GTX280, 8800GT, 9600GSO, 8800GS, 8800GTS – by approximately 10%, all other cards will get just 1-2%.

System Requirements

  • CUDA version only:nVidia GeForce 8xxx and up, at least 256mb of video memory.
  • LATEST nVidia-driver with CUDA support.Standard drivers might be a bit older (as CUDA 2.0 is still beta)
  • CPU with SSE2 support (P4, Core2Duo, Athlon64, Sempron64, Phenom).
  • Recommended 64-bit OS (WinXP 64 or Vista64). 32-bit version is also available.

Download BarsWF 0.8 here:

CUDA:
BarsWF CUDA x64
BarsWF CUDA x32

SSE2:
BarsWF SSE x64
BarsWF SSE x32

Or read more here. (Thanks Navin)


Posted in: Cryptography, Hacking Tools, Password Cracking

Tags: , , , , , , , , ,

Posted in: Cryptography, Hacking Tools, Password Cracking | Add a Comment
Recent in Cryptography:
- PEiD – Detect PE Packers, Cryptors & Compilers
- DROWN Attack on TLS – Everything You Need To Know
- Dell Backdoor Root Cert – What You Need To Know

Related Posts:

Most Read in Cryptography:
- The World’s Fastest MD5 Cracker – BarsWF - 47,693 views
- Hackers Crack London Tube Oyster Card - 44,805 views
- WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key) - 32,995 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Retarded E-mails – Crack Hotmail? Hack Facebook? Boyfriend Cheating?

Your website & network are Hackable


I get a lot of these e-mails, sometimes I receive them almost every day. I had a thought the other day, it might be amusing if I shared them with you guys.

So I’ll post them up every time I receive 2-3. I’ve had a LOT of these kind of e-mails and some spooky ones too offering money for some dodgy hacking activities.

These are pretty much the most common, Facebook/Yahoo/Hotmail hacking requests based on the exscuse of a cheating boyfriend or girlfriend.

Amanda wrote:
My boyfriend accessed his facebook and yahoo account from my computer yesterday. I had cleared the cookies before he got on. How do I determine what his passwords are for those based on the cookies? I think he is cheating. The cookies show where it says “www.facebook.com” and then there are a bunch of numbers and a few letters I think. Please help.

I get a hell of a lot like this too which are basically gibberish.

samuel wrote:
i want to kwon how to hacke and also link me with great hachers.

This one is just plain stupid? If it’s too good to be true – it’s not true.

zam wrote:
Can anyone help me to crack or guide he how to crack hotmail.Cause i had been cheated by this china supplier via msn regarding iphone and what i received is fake iphone. i wish i could stop her by cracking her msn. Her email is openworld2008@hotmail.com .Please help me!!

More e-mail hacking..

alvink wrote:
I am desperately in need to hack an email. I dont need to know how to hack but I
just need to stop that email from functioning.

Are u able to do something? I really hope you are able to help me with this.

Thanks


Someone who wants to partake in Phishing but is too stupid to work it out, he’s even retarded enough to tell me he’s a spammer.

Albert wrote:
please,am a freebie spammer,i need help to hack into people’s Bank of America’s accountor Chase….i need you to give me full details on how i could go about this.. Someone told me i should send a mail to mislead citizens into filling in their Bank of America’s detail on a web-page i should create..they’ll assume they’re verifying their accounts not knowing they are falling prey to spam…please,i dont know how to create this links and mail…please,guide me on what to do….i’ll appreciate that…
hackers forever!!

I think he has no idea what hackers really do. More of the same.

thihamintun wrote:
hello
admin
i want to webmail heack 2.3 software
can u fine me
our country not download this
so can u post me this software
Thank u

Now I’m a credit card provision service too?

Loraine wester wrote:
Helo Sir
I need information regarding where to get credit cards ….

Waiting

Some of these scare me, some worry me and some are just plain funny. More coming soon (this is just a small percentage of what I’ve received in the last month or so).

I’ve made a new category for these special breed of idiots called Retards – so you’ll be able to check the archives out there.


Posted in: Retards

Tags: , , , , , , , ,

Posted in: Retards | Add a Comment
Recent in Retards:
- Retarded E-mails – Damn Interested Hacking, Paid Server Indian Web, Love Hashing & More
- Retarded E-mails – Carding, Coins, Bombs & More!
- Retarded E-mails – Brute Force, Change School Grades, Hack US Military & MORE

Related Posts:

Most Read in Retards:
- Retarded E-mails – Crack Hotmail? Hack Facebook? Boyfriend Cheating? - 64,504 views
- Retarded E-mails – Carding, Coins, Bombs & More! - 33,469 views
- Retarded E-mails – Brute Force, Change School Grades, Hack US Military & MORE - 10,865 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Confused by WEP, WPA, TKIP, AES & Other Wireless Security Acronyms?

Your website & network are Hackable


I found an interesting article today which sums up most of the acryonyms involved in wireless networks and wireless security and explain them all in brief.

It may clear things up for some people who get overwhelmed by all the jargon, especially with the recent news hitting the mainstream about WPA being partially cracked.

Users have every right to be perplexed by wireless security standards. Faced by an alphabet soup of AES, RADIUS, WEP, WPA, TKIP, EAP, LEAP and 802.1x, many users don’t secure their wireless networks at all. Now that earlier wireless security standards such as Wi-Fi Protected Access and Wired Equivalent Privacy are being cracked, it’s time to examine what all the terms mean and think about changes.

Just about a month ago, in early November, the news came out that the first cracks were appearing in WPA, or Wi-Fi Protected Access, a very popular wireless security standard. The compromise that was accomplished by some researchers was not a real killer, but the affected version of WPA (and the associated encryption process, TKIP, or Temporal Key Integrity Protocol), was always meant as a stopgap standard.

So here you go, the acronyms, hope it’s useful to someone :)


  • WEP (Wired Equivalent Privacy)—The old, original, now discredited wireless security standard. Easily cracked.
  • WEP 40/128-bit key, WEP 128-bit Passphrase—See WEP. The user key for WEP is generally either 40- or 128-bit, and generally has to be supplied as a hexadecimal string.
  • WPA, WPA1—Wi-Fi Protected Access. The initial version of WPA, sometimes called WPA1, is essentially a brand name for TKIP. TKIP was chosen as an interim standard because it could be implemented on WEP hardware with just a firmware upgrade.
  • WPA2—The trade name for an implementation of the 802.11i standard, including AES and CCMP.
  • TKIP—Temporal Key Integrity Protocol. The replacement encryption system for WEP. Several features were added to make keys more secure than they were under WEP.
  • AES—Advanced Encryption Standard. This is now the preferred encryption method, replacing the old TKIP. AES is implemented in WPA2/802.11i.
  • Dynamic WEP (802.1x)—When the WEP key/passphrase is entered by a key management service. WEP as such did not support dynamic keys until the advent of TKIP and CCMP.
  • EAP—Extensible Authentication Protocol. A standard authentication framework. EAP supplies common functions and a negotiation mechanism, but not a specific authentication method. Currently there are about 40 different methods implemented for EAP. See WPA Enterprise.
  • 802.1x, IEEE8021X—The IEEE family of standards for authentication on networks. In this context, the term is hopelessly ambiguous.
  • LEAP, 802.1x EAP (Cisco LEAP)—(Lightweight Extensible Authentication Protocol) A proprietary method of wireless LAN authentication developed by Cisco Systems. Supports dynamic WEP, RADIUS and frequent reauthentication.
  • WPA-PSK, WPA-Preshared Key—Use of a shared key, meaning one manually set and manually managed. Does not scale with a large network either for manageability or security, but needs no external key management system.
  • RADIUS—Remote Authentication Dial In User Service. A very old protocol for centralizing authentication and authorization management. The RADIUS server acts as a remote service for these functions.
  • WPA Enterprise, WPA2 Enterprise—A trade name for a set of EAP types. Products certified as WPA Enterprise or WPA2 Enterprise will interoperate (EAP-TLS, EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC & EAP-SIM)
  • WPA-Personal, WPA2-Personal—See Pre-Shared Key.
  • WPA2-Mixed—Support for both WPA1 and WPA2 on the same access point.
  • 802.11i—An IEEE standard specifying security mechanisms for 802.11 networks. 802.11i uses AES and includes improvements in key management, user authentication through 802.1X and data integrity of headers.
  • CCMP—Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An encryption protocol that uses AES.

Enjoy!

Source: eWeek


Posted in: General Hacking, Wireless Hacking

Tags: , , , , , , , , , , , , , , , , ,

Posted in: General Hacking, Wireless Hacking | Add a Comment
Recent in General Hacking:
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,169,048 views
- Hack Tools/Exploits - 624,284 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 433,417 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Microsoft Baseline Security Analyzer – Free Windows Tool

Find your website's Achilles' Heel


Recently we mentioned MSAT – Microsoft Security Assessment Tool and I recalled another tool which came out originally years and years ago and I’ve personally found useful in a few situations.

It’s good when you’re working on a Domain/Group Policy and you want to lock down one machine nice and tight, it can give some pretty good pointers as to how you can secure it further.

What is MBSA?

Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS), System Center Configuration Manager (SCCM) 2007, and Small Business Server (SBS).

In order to provide support for Windows Vista, Windows Server 2008, 64-bit scan tool and vulnerability assessment check support, new Windows Embedded support, and compatibility with the latest versions of the Windows Update Agent (WUA) Microsoft Baseline Security Analyzer (MBSA) 2.1 is now available.

New Features found in MBSA 2.1:

  • Support for Windows Vista and Windows Server 2008
  • Updated graphical user interface
  • Full support for 64-bit platforms and vulnerability assessment (VA) checks against 64-bit platforms and components
  • Improved support for Windows XP Embedded platform
  • Improved support for SQL Server 2005 vulnerability assessment (VA) checks
  • Automatic Microsoft Update registration and agent update (if selected) using the graphical interface or from the command-line tool using the /ia feature
  • New feature to output completed scan reports to a user-selected directory path or network share (command-line /rd feature) Windows Server Update Services 2.0 and 3.0 compatibility

You can download MBSA 2.1 here:

Microsoft Baseline Security Analyzer 2.1

Or read more here.


Posted in: Countermeasures, Security Software, Windows Hacking

Tags: , , , , ,

Posted in: Countermeasures, Security Software, Windows Hacking | Add a Comment
Recent in Countermeasures:
- Fully Integrated Defense Operation (FIDO) – Automated Incident Response
- MISP – Malware Information Sharing Platform
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,083 views
- Password Hasher Firefox Extension - 117,768 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,722 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Malware Researchers Discover Rootkit HKTL-BRUDEVIC Similar to Sony CD Malware

Find your website's Achilles' Heel


You might remember the Sony BMG Rootkit fiasco back in 2006 when the whole Internet was up in arms about Sony installing a rootkit in the name of Digital Restriction Rights Management.

Another piece of malware has been uncovered that has been linked to Sony and their Fingerprint reader.

Researchers have unearthed rootkit-like functionality in an enterprise security product.

Network security software from a Chinese developer includes processes deliberately hidden from a user and, even worse, a hidden directory, Trend Micro reports. Files in the hidden directory could exist below the radar of antivirus scanners, potentially creating a stealthy hiding place for computer viruses that their creators might seek to exploit.

Trend Micro has written to the software developers involved in what looks like a case of misguided software design, rather than anything worse. Pending a fix from software developers, Trend Micro has slapped a “hacking tool” warning on the rootkit-like component of the network security tool (called HKTL-BRUDEVIC).

The irony is it’s actually supposed to be some kind of enterprise security product the rootkit was found in, nothing was mentioned specifically as to which product or company however.

As stated above, it’s most likely misguided and uneducated software design rather than any kind of malicious intent.

It doesn’t name the developers except to say they are the same firm which bundles rootkit-like software with USB storage devices featuring fingerprint authentication.

Sony got a further black eye from issues with its MicroVault USM-F fingerprint reader software last year, which emerged a little over two years after its thorough mauling for including rootkit functionality on its music CDs. The feature, designed to stop fans ripping music tracks, created a security hole exploited by a number of Trojans.

It’s been directly linked to the Sony Microvault fingerprint reader, it’ll be interesting to see if this story develops any further.

Sony could really do without any further bad press on this.

Source: The Register


Posted in: Legal Issues, Malware

Tags: , , , , , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment
Recent in Legal Issues:
- The Panama Papers Leak – What You Need To Know
- FBI Backed Off Apple In iPhone Cracking Case
- TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

Related Posts:

Most Read in Legal Issues:
- Class President Hacks School Grades - 80,699 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,617 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,613 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95