Saturday , April 20 2024 6:42 AM
Home / 2015 / October (page 2)

Monthly Archives: October 2015

YiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken Devices

Less than a month after Apple suffered one of its biggest malware attacks ever, security researchers have discovered another strain of malware that they claim targets both jailbroken as well as non-jailbroken iOS devices. Last month, researchers identified more than 4,000 infected apps in Apple’s official App Store, which was …

Read More »

‘Dropbox Hacker’ Claims To Have 7 Million Passwords

Dropbox users, it may be time to update your passwords and enable two-factor authentication. A hacker claims to have stolen some 7 million usernames and passwords for the popular cloud-based file storage and sharing service. Someone posted a series of links on reddit Monday evening to files that purportedly contain …

Read More »

Tens of Thousands of Routers, IP Cams Infected by Vigilante Malware

The bot, dubbed by Symantec “Linux.Wifatch,” was first spotted in November 2014 when an independent researcher noticed some interesting processes on his home router. Symantec has been monitoring the threat since March 2015 and the security firm has been trying to solve the mystery of Wifatch ever since. Symantec researchers …

Read More »

Avast Antivirus: X.509 Error Rendering Command Execution

Avast will render the commonName of X.509 certificates into an HTMLLayout frame when your MITM proxy detects a bad signature. Unbelievably, this means CN="<h1>really?!?!?</h1>" actually works, and is pretty simple to convert into remote code execution. To verify this bug, I've attached a demo certificate for you. Please find attached …

Read More »

Photos in Wifi v1.0.1 iOS

Document Title: =============== Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1600 Release Date: ============= 2015-09-28 Vulnerability Laboratory ID (VL-ID): ==================================== 1600 Common Vulnerability Scoring System: ==================================== 8.6 Product & Service Introduction: =============================== Share the photos and videos of your iPhone/iPad in wifi. Upload photos …

Read More »

Bosch Security Systems – XML Injection

# Exploit Title: Bosch Security Systems – XML Injection – Dinion NBN-498 Web Interface # Date: 01/09/2015 # Exploit Author: neom22 # Vendor Homepage: http://us.boschsecurity.com # Data Sheet: http://resource.boschsecurity.us/documents/Data_sheet_enUS_9007201286798987.pdf # Version: Hardware Firmware 4.54.0026 – Web Interface version is unknown # Tested on: Windows 8.1 – Firefox 40.0.3 # CVE …

Read More »

Launching 20 DDoS Attacks/Day at 150Gbps

A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps). The distributed denial-of-service network, dubbed XOR DDoS Botnet, targets over 20 websites per day, according to an …

Read More »

How to bypass Android’s lock screen pattern

The main reason to set up some sort of lock screen security on your smartphone is to keep strangers (or friends) from checking out your messages or private pictures. Beyond that, you don’t want anyone who dares to steal your phone to get full access to your mails, pictures or …

Read More »

How to Root

For those new to the world of rooting, acquiring root access essentially grants you elevated permissions. With root access, you are able to access and modify files that would normally be inaccessible, such as files stored on the /data and /system partitions. Having root access also allows you to run an entirely different class of …

Read More »