[Editor's Note: If you haven't yet watched the season finale of Mr. Robot, there are some spoilers here. It's not a recap and it won't ruin the whole episode, but you might want to watch it first before you keep reading.] Within…
0 retweets 1 favorites
The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna
Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack. We start our correlation with the analysis of the exploit payload – a remote adminis…
It’s pretty impressive to know an 18 year old Italian teenager is already finding vulnerabilities in OS X. However, I hope he learns to disclose them responsibly, and starts informing vendors first. This week, news surfaced of a zero day privileges escalation flaw in the latest version of OS X Yosemite
0 retweets 0 favorites
Cisco is warning its customers that attackers have been overwriting the iOS ROMMON firmware of some of their customers routers, replacing it with a malicious firmware trojan. Watch today’s video to learn more about this attack, and what Cisco says you can do.
Weeks ago, I shared a story about a scary remote car hack researchers were previewing before Black Hat.
When I started in information security, I’d never have guessed hackers would be able to cause sniper rifles to shoot off target. However, the latest research has made that idea a reality. See today’s video to learn about this interesting new hack, and why it should make you aware of the dangers of the “Internet of Thing”.
We can’t condone cyber crime, even when the hacktivists have morals. A group of attackers calling themselves The Impact Team have breached a well-known online cheating site, and threatened to expose all its customers if they don’t shutdown shop. Watch today’s video to learn about this scandalous cyber drama, and why you shouldn’t post anything online that you don’t want your Grandma to see. (Episode Runtime: 3:41 ) Direct YouTube Link: https://www.youtube.com/watch?v=Uvow48dkF54 EPISODE REFERENCES: Popular Adultery site breached and extorted – Krebs on Security Who needs hackers if you can already see who’s cheating – Motherboard How you can see if an email address is on Ashley Madison (AM) – Troy Hunt Why the AM breach is everyone’s problem – The Verge What the AM hack teachs you about OpSec – Motherboard — Corey Nachreiner, CISSP ( @SecAdept )