https://latesthackingnews.com/2018/09/30/mojave-flaws-allow-an-attacker-to-bypass-full-disk-access-requirement/
Tags: #security #macos
Tags: #security #macos
Latest Hacking News
Mojave Flaws Allow An Attacker To Bypass Full Disk Access Requirement
Right after the launch of the latest MacOS Mojave, researchers have begun discovering various security vulnerabilities. Amidst the claims of releasing a specific protective OS for the users, such bugs raise concerns about the security features. Recently,…
https://thenextweb.com/artificial-intelligence/2018/11/15/researchers-create-master-key-fingerprints-that-can-fool-biometric-databases
Tags: #security #biometry
Tags: #security #biometry
TNW
Researchers create ‘master key’ fingerprints that can fool biometric databases
Researchers from New York University have created a set of master fingerprint keys that can be used to spoof biometric identification systems.
https://www.cc.gatech.edu/~slee3036/papers/lee:gpu.pdf
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
https://thehackernews.com/2018/12/linux-user-privilege-policykit.html
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5
Tags: #security #js #nodejs
Tags: #security #js #nodejs
Hackernoon
HackerNoon - read, write and learn about any technology
How hackers start their afternoon. HackerNoon is a free platform with 25k+ contributing writers. 100M+ humans have visited HackerNoon to learn about technology
https://www.forcepoint.com/blog/security-labs/attacking-internal-network-public-internet-using-browser-proxy
Tags: #networking #security #javascript
Tags: #networking #security #javascript
Forcepoint
Attacking the internal network from the public Internet using a
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a