https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.
https://nakedsecurity.sophos.com/2018/06/28/windows-10-security-can-be-bypassed-by-settings-page-weakness/
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Naked Security
Windows 10 security can be bypassed by Settings page weakness
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
https://protonmail.com/blog/openpgpjs-protonmail-security-audit/
Tags: #security #encryption #javascript
Tags: #security #encryption #javascript
ProtonMail Blog
ProtonMail’s open source encryption library security audit - ProtonMail Blog
We maintain the OpenPGPjs encryption library. After some recent code enhancements, OpenPGPjs underwent an independent security audit, the results of which are discussed in this article.
https://latesthackingnews.com/2018/09/30/mojave-flaws-allow-an-attacker-to-bypass-full-disk-access-requirement/
Tags: #security #macos
Tags: #security #macos
Latest Hacking News
Mojave Flaws Allow An Attacker To Bypass Full Disk Access Requirement
Right after the launch of the latest MacOS Mojave, researchers have begun discovering various security vulnerabilities. Amidst the claims of releasing a specific protective OS for the users, such bugs raise concerns about the security features. Recently,…
https://thenextweb.com/artificial-intelligence/2018/11/15/researchers-create-master-key-fingerprints-that-can-fool-biometric-databases
Tags: #security #biometry
Tags: #security #biometry
TNW
Researchers create ‘master key’ fingerprints that can fool biometric databases
Researchers from New York University have created a set of master fingerprint keys that can be used to spoof biometric identification systems.
https://www.cc.gatech.edu/~slee3036/papers/lee:gpu.pdf
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
https://thehackernews.com/2018/12/linux-user-privilege-policykit.html
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5
Tags: #security #js #nodejs
Tags: #security #js #nodejs
Hackernoon
HackerNoon - read, write and learn about any technology
How hackers start their afternoon. HackerNoon is a free platform with 25k+ contributing writers. 100M+ humans have visited HackerNoon to learn about technology
https://www.forcepoint.com/blog/security-labs/attacking-internal-network-public-internet-using-browser-proxy
Tags: #networking #security #javascript
Tags: #networking #security #javascript
Forcepoint
Attacking the internal network from the public Internet using a
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a