252
Security researchers at Check Point Software Technologies have discovered a new attack vector against the Android operating system that could potentially allow attackers to silently infect your smartphones with malicious apps or launch denial of service attacks.

Dubbed Man-in-the-Disk, the attack takes advantage of the way Android apps utilize 'External Storage' system to store app-related data,


252
Get your update caps on.

Just a few minutes ago Microsoft released its latest monthly Patch Tuesday update for August 2018, patching a total of 60 vulnerabilities, of which 19 are rated as critical.

The updates patch flaws in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore, .NET Framework, Exchange Server, Microsoft SQL Server and Visual Studio.

Two of these


183

The Amazon Echo is generally the first name which comes to mind when you think of a smart home speaker



DEF CON Update: Researchers Find A Method To Turn Amazon Echo Into A Spy on Latest Hacking News.

253
Adobe has released August 2018 security patch updates for a total of 11 vulnerabilities in its products, two of which are rated as critical that affect Adobe Acrobat and Reader software.

The vulnerabilities addressed in this month updates affect Adobe Flash Player, Creative Cloud Desktop Application, Adobe Experience Manager, Adobe Acrobat and Reader applications.

None of the security


255
The Information Technology industry has witnessed exponential growth over the years, and if you want to be a part of this growing industry, it's important for you to earn certificates in this field.

Organisations always prefer employees with strong internationally-recognized professional certifications that proof your skills, knowledge, and what you know—giving you more credibility and


169

Tesla is having thoughts of open sourcing the security module of its self-driving cars. Elon Musk has posted on Twitter



Tesla Plan To Release Source Code For Its In-Car Security Tech on Latest Hacking News.

253
What maximum a remote attacker can do just by having your Fax machine number?

Believe it or not, but your fax number is literally enough for a hacker to gain complete control over the printer and possibly infiltrate the rest of the network connected to it.

Check Point researchers have revealed details of two critical remote code execution (RCE) vulnerabilities they discovered in the


174

While we have been hearing plenty of peculiar reports from the Def Con hacker conference since the time it started,



Faxploit – Fax Machines Allow Hackers To Take Over An Entire Network on Latest Hacking News.

185

On the August 14th Latest Hacking News Podcast new KeyPass ransomware variant making the rounds, TLS 1.3 officially approved as standard and Google logging users' location even if "Location History" is turned off.



Latest Hacking News Podcast #98 on Latest Hacking News.

152

U.S. House Candidates Vulnerable To Attacks

logicfish Security headline hacker government usa cyberwar All https://packetstormsecurity.com   Discuss    Share
220

Former NSA Top Hacker Names The Filthy Four Of Nation-State Hacking

logicfish Security headline hacker government usa russia china cyberwar korea iran nsa All https://packetstormsecurity.com   Discuss    Share
192

The fsociety hacking tools pack is a penetration testing framework that consists of many of the hacking tools used in



Fsociety Hacking Tools Pack – Open Source Penetration Testing Framework on Latest Hacking News.

185

Malicious Faxes Leave Firms Open To Cyber Attack

logicfish Security headline hacker flaw All https://packetstormsecurity.com   Discuss    Share
253
Google tracks you everywhere, even if you explicitly tell it not to.

Every time a service like Google Maps wants to use your location, Google asks your permission to allow access to your location if you want to use it for navigating, but a new investigation shows that the company does track you anyway.

An investigation by Associated Press revealed that many Google services on Android and


245

macOS Vuln Paves Way For Single Click Compromise

logicfish Security headline hacker flaw apple conference All https://packetstormsecurity.com   Discuss    Share
190

The ongoing DefCon 2018 has so far been revealing many interesting things. Researchers have kept many of their important discoveries hidden



Many Pre-Installed Apps In Android Have Severe Vulnerabilities on Latest Hacking News.

251
Your Mac computer running the Apple's latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday.

Patrick Wardle, an ex-NSA hacker and now Chief Research Officer of Digita Security, uncovered a critical zero-day vulnerability in the macOS operating system that could allow a malicious application


177

This year’s Black Hat USA and DefCon indeed bring some most interesting discoveries. Recently, researchers demonstrated at the event an



MDM Vulnerability Could Allow Remote Hacking of a Mac Right Out Of The Box on Latest Hacking News.

251
Bought a new Android phone? What if I say your brand new smartphone can be hacked remotely?

Nearly all Android phones come with useless applications pre-installed by manufacturers or carriers, usually called bloatware, and there's nothing you can do if any of them has a backdoor built-in—even if you're careful about avoiding sketchy apps.

That's exactly what security researchers from mobile


167

German data protection group named Digital Courage has filed a complaint against the German Government in Constitutional Court. The government



Complaint Filed Against German Government Due To Hacking of Citizen Computers and Mobile Phones on Latest Hacking News.

182

Once again, the infamous Dharma ransomware appears all set to begin a massive infection campaign. It comes back as a



New Variant of Dharma Ransomware Discovered on Latest Hacking News.

193

DEF CON 2018 news roundup! 11-year-old hacks replica election site in under 10 minutes, Google engineer kicked from convention and



Latest Hacking News Podcast #97 on Latest Hacking News.

157

Since the Facebook Scandal many users over the world have been searching for a more secure medium to communicate. Criptext



New Email Client Announced by Criptext Focuses on User Privacy on Latest Hacking News.

192

Trape is a tool written in python that can aid in tracking a client after utilising a phishing attack. When



Trape – A Free GUI Based Phishing/Tracking Tool on Latest Hacking News.

152

A security researcher named Christopher Domas spoke at the recent Black Hat conference highlighting some x86 CPUs are installed with



Hacker Discovered “God Mode” Whilst Fuzzing Some Old x86 CPU’s on Latest Hacking News.

197

Microsoft works continually to improve the security of its Windows 10 operating system. Although the tech giant has certainly made



“Open Sesame” Vulnerability That Let Users Hack Windows 10 Was Demonstrated at Black Hat Conference on Latest Hacking News.

199

Once again, a massive cyber attack on a government’s computer has affected thousands of citizens. Reportedly, the data of more



Massive Wisconsin Data Breach – Data Of More Than 258K People Accessed on Latest Hacking News.

183

A report from telemetric data analysis revealed that less than half of companies do proper vulnerability testing. The data also



Only 48% of the companies do proper security vulnerability testing on Latest Hacking News.

189

Social Mapper is an open source tool that searches for profile information from social media sites, such as Facebook, Instagram,



Social Mapper – Find Social Media Profiles Using Only a Photo on Latest Hacking News.

157

A browser extension named Ahoy! which acts as an Anti-Censorship tool and allows users to access more than 1700 blocked



Google has kicked Ahoy! the Anti-Censorship App From The Chrome Store on Latest Hacking News.

What is Plikli?

Plikli is an open source content management system that lets you easily create your own user-powered website.

BMC logoBuy me a coffee
Latest Comments
Statistics