Archive | Exploits/Vulnerabilities

Three Charged With Hacking Dave & Buster’s Chain

Another big heist in the US netting a whole lot of juicy information on credit and debit cards, over half a million USD lost in this case alone. There’s a whole lot of fraud going on.. Not bad for fiddling with the cash register system of a restaurant chain. It just shows, anyone dealing with […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking, Legal Issues, Privacy | Add a Comment

oCERT – Responsing to Flaws in Open Source Software

So a new initiative – the Open Source Computer Emergency Response Team known as oCERT has been set up one of the main sponsors being Google (read more here – Contributing to Open Source Software Security). The oCERT project is a public effort providing security handling support to Open Source projects affected by security incidents […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment

Patch Window Shrinking – Semi-Automated Reverse Engineering

As far as I know this has been happening for some time, sometimes a patch comes out for a vulnerability that many people don’t know about (including the hackers) so they will see what problem the patch fixes (possibly through reverse engineering) then develop an exploit to leverage on the flaw. It seems things are […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Programming | Add a Comment

Hackers Could Become The Hacked?

It looks like someone is going after the bad guys in a new way, by hacking them back! It’s no news to us that many hacking tools and script kiddy trojan kits are badly programmed..a lot of them have back-doors and the client-side tools have easy exploits that enable you to take over the ‘hackers’ […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware | Add a Comment

Keep on Fuzzing! Advice

As you will have noticed we’ve posted quite a number of Fuzzing Tools built around different frameworks and in different languages..most for difference targets/purposes too. Fuzzing has definitely exploded in the last year or so as more people try and understand it and code tools to automate the process. There are tools for Web Services […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Programming | Add a Comment

Spammers Harnessing Web Mail Servers – Gmail & Yahoo! Throttled

It seems like spammers are now moving to automated spam via popular web mail services as a way to bypass IP-blacklisting services. It’s a large advantage for them as they can still use botnet sources to generate the e-mail but the source IP address will be from a ‘trusted’ domain such as Gmail or Yahoo!. […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Spammers & Scammers | Add a Comment

Biometric Keylogger Can Grab Fingerprints

Well this is quite scary as biometrics are touted as the ultimate in security and two factor authentication with biometrics is about as ‘heavy’ as most places get. The fact that the biometric data can be ‘sniffed’ reconstructed and re-used…is worrying to say the least. Do any of you have biometric measures in your workplace? […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

iFrame Piggybacking on Google Searches to Install Malware

These spammers and scammers are getting rather clever, and very sneaky. This is still epedemic and seems to be happening more and more. It takes a re-write of many of the large sites online..which frankly isn’t going to happen is it? It just shows once again the spammers will think of all kinds of weird […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers, Web Hacking | Add a Comment

Mac owned on 2nd day of Pwn2Own hack contest

I have been following this contest and was wondering which OS would be first to fall (if any) seen as though they were all fully patched and the latest versions. For those that don’t know Pwn2Own is a contest at CanSecWest open to anyone to hack a Windows, Linux or Mac OSX box with a […]

Tags: , , , , , , , , , ,

Posted in: Apple, Events/Cons, Exploits/Vulnerabilities | Add a Comment

New Windows XP & Vista Full Take-over Hack with Firewire

This Firewire hack seems to be creating a big buzz, from what I’ve read it also works on Vista as for some odd reason the Firewire port gets access to the whole memory space in DMA mode – not just what it needs to function – so you can read from anything stored in memory […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·