154
29 Views
New report after 12 forces across England and Wales trialled technology

MPs across parties have called for an immediate "stop" to live facial recognition surveillance by the police and in public places.…

243
34 Views
Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country's history.

Personal records of more than 20 million adults and children, both dead and alive, were found publicly exposed on an unsecured
160
48 Views
Pair of bug reports show how VM escapes put servers at risk

A pair of newly disclosed security flaws could allow malicious virtual machine guests to break out of their hypervisor's walled gardens and execute malicious code on the host box.…

159
20 Views
Brit airport to extend facial recog after easyJet trial

Gatwick Airport will extend its use of facial recognition to match passengers to their passports at departure gates before they board planes.…

151
45 Views

BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of targets with the objective



BoomER | An Open Source Post-Exploitation Tool To Exploit Local Vulnerabilities on Latest Hacking News.

192
49 Views
Tired: SQLi. Expired: Format string exploits. Hired: Anyone who can port code from C/C++

On Tuesday, the Common Weakness Enumeration (CWE) team from MITRE, a non-profit focused on information security for government, industry and academia, published its list of the CWE Top 25 Most Dangerous Software Errors.…

233
38 Views
The United States government today filed a lawsuit against Edward Snowden, a former contractor for the CIA and NSA government agencies who made headlines worldwide in 2013 when he fled the country and leaked top-secret information about NSA's global and domestic surveillance activities.

And you would be more surprised to know the reason for this lawsuit—No, Snowden has not been sued for
159
93 Views
You want root shell access? No problem

A new report has suggested that 12 out of 13 network devices, such as routers and network-attached storage appliances, are vulnerable to hacks that enable "root-privileged access without any authentication".…

194
47 Views
Whole pile of US data just sitting there with no security

Around 24 million medical patients' data is floating around on the internet, freely available for all to pore over – thanks to that good old common factor, terribly insecure servers.…

162
40 Views
Uncle Sam tries to plug leaker's pay, ends up plugging leaker's book

The US government today sued former CIA employee and NSA sysadmin contractor Edward Snowden to deny him payment from his newly published book, Permanent Record.…

248
54 Views
"Warning — Making your calendar public will make all events visible to the world, including via Google search. Are you sure?"

Remember this security warning? No?

If you have ever shared your Google Calendars, or maybe inadvertently, with someone that should not be publicly accessible anymore, you should immediately go back to your Google settings and check if you're exposing all your events
168
19 Views
Security engineer actually reads privacy policy to his horror

Hewlett-Packard Inc's printers don't just slurp the contents of your wallet at a frightening rate. They also guzzle a surprising amount of data on you and whatever you're printing.…

177
31 Views
Government cares what you think. Honest

A UK Home Office consultation on new, intrusive police powers was so incompetently written that you could both "strongly agree" and "strongly disagree" at the same time when answering its questions.…

212
44 Views
The world of connected consumer electronics, IoT, and smart devices is growing faster than ever with tens of billions of connected devices streaming and sharing data wirelessly over the Internet, but how secure is it?

As we connect everything from coffee maker to front-door locks and cars to the Internet, we're creating more potential—and possibly more dangerous—ways for hackers to wreak havoc.
167
50 Views

LastPass is a popular password manager that has earned credibility owing to its efficiency. Nonetheless, like any other software, it



LastPass Vulnerability Leaked Login Credentials – Update Now! on Latest Hacking News.

239
14 Views
Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.

Dubbed "SimJacker," the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards
1
2 Views
Plus: The spambot that actually DOES record screens of pr0n users

Roundup  Here is your friendly summary of recent news from the front lines of information security beyond everything else we've already reported.…

165
14 Views
Alternative Services spec bungled by browser makers

The HTTP Alternative Services header can be abused to conduct network reconnaissance and attacks, to bypass malware protection services, and to foil tracking defenses and privacy assumptions, according to a paper scheduled to be presented at the WOOT '19 security conference on Tuesday.…

1
13 Views
A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows XP to the latest Windows 10.

The vulnerability resides in the way MSCTF clients and server communicate with each other, allowing even a low privileged or a sandboxed application to read and write data to a higher
218
13 Views
If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately.

Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the recently patched 'BlueKeep' RDP vulnerability.

Discovered by Microsoft's security team itself, all
1
10 Views
Infosec bod bags reward for spotting image privacy bug

VIdeo  Telegram has fixed a bug that broke one of its chat app's key privacy features: the ability to fully delete your sensitive messages on recipients' phones.…

164
44 Views
Update now to stop webpages snooping on recently used credentials

LastPass has fixed a security bug that potentially allowed malicious websites to obtain the username and passphrase inserted by the password manager on the previously visited site.…

199
51 Views

A researcher discovered a vulnerability in Uber API app that could allow an adversary to take over users’ accounts. Exploiting



Critical Vulnerability Discovered In The Uber App That Could Allow Account Takeovers on Latest Hacking News.

204
18 Views
The massive data breach at Capital One – America's seventh-largest bank, according to revenue – has challenged many common assumptions about cloud computing for the first time.

Ironically, the incident, which exposed some 106 million Capital One customers' accounts, has only reinforced the belief that the cloud remains the safest way to store sensitive data.


"You have to compare [the cloud]
163
47 Views

It would seem that Facebooks’ Instagram frequently makes it to the news due to its security glitches. Recently, a researcher



Instagram Flaw That Could Have Previously Exposed User Data Now Patched on Latest Hacking News.

163
21 Views
And Julian Assange is among them - but how old are these?

Records on more than 20 million individuals in Ecuador have leaked from an unsecured database in Miami, Florida, containing a mix of official citizen registration data and personal & banking details.…

192
24 Views

After the launch of iOS 12, a researcher discovered back-to-back lock screen bypass flaws in the system exploiting various features.



An iOS 13 Bug Exposes Device Contacts While Exploiting FaceTime Call on Latest Hacking News.

165
37 Views
So much for the public deterrence value of attribution

Australian spooks concluded that China was to blame for a series of hacks on its parliament and leading political parties – but kept it quiet for fear of angering the Middle Kingdom, according to reports.…

155
37 Views

Telegram is one of the most-trusted apps when it comes to private messaging. Therefore, any security or privacy bug arising



A Serious Privacy Bug In Telegram Could Allow Retrieval of Media From Deleted Messages on Latest Hacking News.

177
43 Views
Mistakenly sent a picture to someone via WhatsApp that you shouldn't have?

Well, we've all been there, but what's more unfortunate is that the 'Delete for Everyone' feature WhatsApp introduced two years ago contains an unpatched privacy bug, leaving its users with false sense of privacy.

WhatsApp and its rival Telegram messenger offer "Delete for Everyone," a potentially life-saving feature
150
47 Views

Google has been tightening up its security checks for applications on the Play Store for quite a while. Yet, these



Hundreds Of Android Flashlight Apps Demand Unnecessary Permissions on Latest Hacking News.

184
58 Views
AWS spills the beans

Promo  You know it makes sense to go to the cloud, and you know it makes sense to encrypt your data. But just what should you be encrypting - and where? And what’s the most efficient way of carrying it out, and managing your encryption strategy in the future?…

Newsletter
Sign up for our newsletter


Unsubscribe at Anytime | Privacy Policy
Welcome, DisDroidians

Sign up and post your links!

sponsored
Most Viewed Stories
Latest Comments
Statistics
Disdroid.co.uk - ranking and value