Tag Archives Vulnerability

Many ATMs currently in India are susceptible to data breach and hacking because they run on outdated Microsoft software. There is a high probability that the ATM in your area is running on software, Microsoft stopped supporting and enhancing long back. Astonishingly about 70% ATMs in India run on Windows XP, for which Microsoft stopped offering security updates, patches and…

The Hacker Group, Shadow Hackers claim that they have a new list of organizations that it claims the NSA - US Governments security agency, has hacked for more than a decade. In a post it claims of having in its possession ip addresses of these organizations that point to the Equation Group that is supposedly a bunch of NSA affiliated…

Taking Down Drones by Hacking Them

With Drones buzzing the sky everywhere, some countries are outright banning them while others are restricting their activities. And yet, Drones could be pretty much useful in various situations such as providing emergency medical aid or delivering packages to your door from E-Commerce websites. And ofcourse drones are also used by he military and law enforcement for surveillance and attacking…

Zero Day means precisely that. There is no previous history of a vulnerability or the malware. There is a commercial market for manufacturing Zero Day exploits that hook on to previously unknown vulnerabilities. And according to the FBI, this was how they could break into  a terrorists iPhone when Apple refused to help. Both hackers, black and white ones are…

When one was hoping there is some sense of security in the cloud, here comes the Rowhammer exploit. Once successful, the Rowhammer attacks virtual machines and takes over complete control with existing encryption solutions unable to stop it. Rowhammer is a highly sophisticated exploit were one virtual machine on the cloud is able to steal the encryption key of another…

Uber has made a name for itself around the world capturing the imagination of cab owners, confronting other traditional cabbies and unions. That can all be taken care off through conflict resolution and negotiation. However,  the mobile based cab hiring service may be technically susceptible to hacking may be another reason for the team at Uber to worry about. Customers…

When one Bird falls, all the rest fall too! This could not be far from the truth with respect to Linux whose traffic hijack flaw seem to have also affected 1.4 billion android devices as well and these include all those with Android 4.4 KitKat and later. What was supposed to be intention with a noble purpose in protecting the…

All the time we can fabulous email offers purportedly from familiar sources, be it your bank or  the IRS or even an online service such as Twitter. And all one needs to do is sign into their account to avail of the offer. Generally these offers are time limited so that you need to hurry and fill up the details…

This may really be a shocking news specially considering the recent spate of air crashes involving both technical and terrorist attacks. It is already a fact that most modern airlines have a built in remote control system that can take over the controls of the plane in case of an emergency. Ofcourse, this depends on certain instruments functioning. According to…

A new kid off the block in packing SSL called StartEncrypt has found to be vulnerable to exploitation. Similar to the popular Let's Encrypt SSL certificates that now commonly deployed on websites challenging established players such as Comodo which charge a premium, StartEncrypt also trying to get a foothold into the FREE SSL space. According to Computest, a security research…

12
Close