PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Mise à jour

Mise à jour de la base de données, veuillez patienter...

Windows Error Crash Reports or Treasure of Zero-Day vulnerabilities for NSA?

vendredi 3 janvier 2014 à 11:22
I am sure that you all have been familiar with the above shown annoying Window Operating System error messages that many times pop ups on your screen while working on the system in case of process failure i.e. "The system has recovered from a serious error. A log of this error has been created. Please tell Microsoft about this problem" The message that prompts ask the user to report the problem

Abusing Network Time Protocol (NTP) to perform massive Reflection DDoS attack

vendredi 3 janvier 2014 à 08:25
In 2013, we have seen a significant increase in the use of a specific distributed denial of service (DDoS) methodology known as Distributed Reflection Denial of Service attacks (DrDoS). Open and misconfigured DNS (Domain Name System) can be used by anyone to resolve domain names to IP addresses are increasingly abused to launch powerful DDoS attacks.<!-- adsense -->But not only the DNS servers,

Hackers stole money from European ATMs using Malware-loaded USB Device

jeudi 2 janvier 2014 à 16:44
Hacking ATM Machines is nothing new, but it seems that instead of relying on ATM skimmers now some smart hackers in Europe are reportedly targeting ATM Machines using Malware-loaded USB drives to steal money.<!-- adsense -->Most of the world’s ATMs are running on Windows XP operating system, which is highly vulnerable to Malware attacks. Just like your Desktop Laptops, some ATMs also have USB

DROPOUTJEEP: NSA's Secret program to access any Apple iPhone, including microphone & camera

jeudi 2 janvier 2014 à 12:32
In the era of Smartphones, Apple’s iPhone is the most popular device that exists, which itself gives the reason to target it. According to leaked documents shared by Security researcher Jacob Appelbaum, a secret NSA program code named DROPOUTJEEP has nearly total access to the Apple’s iPhones, which uses “modular mission applications to provide specific SIGINT functionality.”<!-- adsense -->While

Firmware vulnerability allows man-in-the-middle attack using SD Memory cards

jeudi 2 janvier 2014 à 11:33
How is it possible to exploit SD Card, USB stick and other mobile devices for hacking? Another interesting hack was presented at the Chaos Computer Congress (30C3), in Hamburg, Germany. The researchers demonstrated how it is possible to hack the microcontroller inside every SD and MicroSD flash cards that allow arbitrary code execution and can be used to perform a man in the middle attack. The
Error happened! 0 - count(): Argument #1 ($value) must be of type Countable|array, null given In: /var/www/ecirtam.net/autoblogs/autoblogs/autoblog.php:428 http://ecirtam.net/autoblogs/autoblogs/plusgooglecom108722708627977273008_4b868befb999be8d4a12cee6eafcf1d5f929d04b/?1939 #0 /var/www/ecirtam.net/autoblogs/autoblogs/autoblog.php(999): VroumVroum_Blog->update() #1 /var/www/ecirtam.net/autoblogs/autoblogs/plusgooglecom108722708627977273008_4b868befb999be8d4a12cee6eafcf1d5f929d04b/index.php(1): require_once('...') #2 {main}