Today something funny happened to me, I was crawling the web for PDFs files when I noticed my Ubuntu 16.04 wget command segfaulting, which is a pretty rare thing considering how well those commands are tested against input. On Ubuntu 16.04 a wget version 1.17.1 is shipped, GNU Wget 1.17.1[…]
Author: Shubham Kumar
Hacker found a flaw in the UK Defence Gateway that exposes army data
The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway that exposes army data. The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway, an application only for the staff use, that could be exploited by attackers[…]
Email Servers For More Than Half of Worlds Top Sites Can Be Spoofed
More than half of the world’s top sites suffer from misconfigured email servers, something that heightens the risk of having spoofed emails sent from their domains, researchers warn. Researchers at Detectify, a Swedish web security firm, recently combed through hundreds of domains and found that many of them suffer from[…]
Amazon launches data centers in Mumbai
Amazon Web Services (AWS) World’s leading cloud computing platform, Amazon Web Services (AWS) announced the launch of the Asia-Pacific (Mumbai) Region. The Mumbai region is the sixth in Asia Pacific for Amazon, and with this announcement, AWS now provides 35 availability zones across 13 technology infrastructure regions globally. The newest region[…]
Malware could steal data from air-gapped PC
Imagine you’re a cybercriminal and you want to steal information from a malware-infected PC that isn’t connected to the internet, isn’t connected to any other computers, and that you don’t have any physical access to. How malware could steal data from air-gapped PC via its fan. How would you do[…]
Uber Under Attack by Pen Testers
Uber Under Attack – How penetration testers turn bugs into breaches Don’t-call-them-taxis firm Uber is used to being in the security news. From stolen credentials showing up on the dark web, through the controversy of raiding a reporter’s trip history because she was late for a meeting, to a leaky[…]
Hacking the Mitsubishi Outlander PHEV hybrid
Hacking the Mitsubishi Outlander PHEV hybrid Security researchers have managed to successfully hack a Mitsubishi Outlander PHEV SUV, which has allowed them to mess around with the car’s charging system, headlights, and even turn off its alarm.Hacking the Mitsubishi Outlander PHEV hybrid Hacking the Mitsubishi Outlander PHEV hybrid, the Mitsubishi[…]
German researchers discover a flaw that could let anyone listen to your cell calls
German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in[…]
Google Android N Preview 6 Cool Features
Introduction to Android N Android N Developer Preview, an early beta of Google’s new mobile operating system that was expected to launch on Google I/O in mid-May, has unexpectedly launched a few days back. Android N Developer Preview for the Nexus 6P, Nexus 5X, Nexus 6, Pixel C Nexus 9,[…]
Hackers demo prototype security scanner that thinks like a human
Hackers demo prototype security scanner that thinks like a human, First of its kind project a mammoth effort. Hackers demo prototype security scanner that thinks like a human. Nullcon Bangalore hacker Rahul Sasi has built the beginnings of what he hopes will become a vulnerability scanner that thinks like a[…]
Attacking Common Backdoors and Botnets via Metasploit Framework
Attacking Common Backdoors and Botnets via Metasploit Framework The Metasploit Framework has a lot of exploit modules including buffer overflow attacks, browser exploits, web application vulnerabilities, backdoor exploits, bot pwnage tools, etc. Exploit developers and contributors to the framework have shared a wide variety of interesting and very useful stuffs.[…]
What Are DDoS (Distributed Denial of Service) Attacks
Introduction Contrary to what you might believe, DDoS (Distributed Denial of Service) attacks are considerable, a serious cyber threat able interrupt a web service provided by an organization causing serious consequences. The methods of attacks could be adopted for various purposes by different entities, for example a group of cyber-criminals[…]