ame Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 15:36:10 GMT Full Article headline government usa conference cryptography rsa
ame Intel Decides To Rid Itself Of The McAfee Name By packetstormsecurity.com Published On :: Tue, 07 Jan 2014 16:21:01 GMT Full Article headline virus mcafee intel
ame Bing.com Hostname / IP Enumerator 1.0 By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:21:05 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
ame WebSploit Framework 4.0.1 By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 17:22:22 GMT WebSploit is an advanced man-in-the-middle framework. Full Article
ame 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
ame No cON Name 2019 Call For Papers By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:21:33 GMT The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019. Full Article
ame Indian Police Arrest Four For Game Of Thrones Leak By packetstormsecurity.com Published On :: Tue, 15 Aug 2017 13:31:45 GMT Full Article headline hacker india data loss
ame Data Of Nearly 700,000 Amex India Customers Exposed Via Unsecured MongoDB Server By packetstormsecurity.com Published On :: Wed, 07 Nov 2018 16:32:01 GMT Full Article headline privacy bank india cybercrime data loss fraud
ame US Says Romanians Hacked Washington DC Police Cameras By packetstormsecurity.com Published On :: Fri, 29 Dec 2017 14:08:11 GMT Full Article headline hacker government privacy usa cyberwar romania
ame Symantec: Don't Blame Us For New York Times Hack By packetstormsecurity.com Published On :: Fri, 01 Feb 2013 05:48:58 GMT Full Article headline hacker china data loss symantec
ame Windscribe WindscribeService Named Pipe Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:54:05 GMT The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64). Full Article
ame Court Finds FBI Use Of NSA Database Violated Americans' 4th Amendment Rights By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:38 GMT Full Article headline government privacy usa data loss spyware fbi nsa
ame Russian Loses Wife In Poker Game By packetstormsecurity.com Published On :: Wed, 31 Jan 2007 00:59:27 GMT Full Article russia gamble
ame SetNamedSecurityInfo() Ignores / Destroys Protected DACLs / SACLs By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 18:23:33 GMT With Windows 2000 Microsoft introduced the inheritance of access rights and new Win32-API functions like SetNamedSecurityInfo() which handle the inheritance. SetNamedSecurityInfo() but has a serious bug: it applies inheritable ACEs from a PARENT object to a target object even if it must not do so, indicated by the flags SE_DACL_PROTECTED and/or SE_SACL_PROTECTED in the security descriptor of the target object. Full Article
ame US Names The Day For Biometric Passports By packetstormsecurity.com Published On :: Tue, 22 Jul 2003 16:02:55 GMT Full Article usa passport
ame TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
ame Games Of Thrones Has The Most Malware Of Any Pirated TV Show By packetstormsecurity.com Published On :: Wed, 03 Apr 2019 14:01:33 GMT Full Article headline malware mpaa pirate
ame Latin America Becoming Newest Malware Hotbed By packetstormsecurity.com Published On :: Fri, 03 May 2013 14:50:16 GMT Full Article headline malware cyberwar venezuela brazil scada
ame Suspected Commonwealth Games DDoS Was Only A Fortnite Update By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:20 GMT Full Article headline denial of service
ame Anonymous Hacker Gets 6 Years For Some Lame DDoS Attacks By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:01:52 GMT Full Article headline hacker denial of service anonymous
ame Mobile Security Framework MobSF 0.9.2 Beta By packetstormsecurity.com Published On :: Tue, 03 May 2016 10:32:22 GMT Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting. Full Article
ame Mobile Security Framework MobSF 0.9.3 Beta By packetstormsecurity.com Published On :: Wed, 23 Nov 2016 00:49:57 GMT Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting. Full Article
ame Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 23:51:18 GMT Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework. Full Article
ame Bing.com Hostname / IP Enumerator 1.0.2 By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:28:49 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
ame ACDSee FotoSlate PLP File id Parameter Overflow By packetstormsecurity.com Published On :: Mon, 10 Oct 2011 22:35:13 GMT This Metasploit module exploits a buffer overflow in ACDSee FotoSlate 4.0 Build 146 via a specially crafted id parameter in a String element. When viewing a malicious PLP file with the ACDSee FotoSlate product, a remote attacker could overflow a buffer and execute arbitrary code. This exploit has been tested on systems such as Windows XP SP3, Windows Vista, and Windows 7. Full Article
ame .NET Framework 4.6 DLL Hijacking By packetstormsecurity.com Published On :: Tue, 12 Apr 2016 14:44:44 GMT A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View. Full Article
ame Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
ame Turkish Hacker Defaces Kiwi Parliament Website By packetstormsecurity.com Published On :: Mon, 20 Sep 2010 01:09:00 GMT Full Article hacker government turkey
ame Turkish Net Hijack Hits Big Name Websites By packetstormsecurity.com Published On :: Mon, 05 Sep 2011 14:28:05 GMT Full Article headline hacker israel turkey
ame American Gets Targeted By Spy Tool Sold To Foreign Governments By packetstormsecurity.com Published On :: Tue, 04 Jun 2013 13:41:22 GMT Full Article headline government privacy malware usa spyware turkey
ame GNUnet P2P Framework 0.11.5 By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 16:11:23 GMT GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing. Full Article
ame Scammers Abuse Multilingual Domain Names By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:32 GMT Full Article headline dns cybercrime fraud phish
ame Macs Framework 1.14f Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:33:28 GMT Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
ame Hacker House Shoved Under UK Parliament's Spotlight By packetstormsecurity.com Published On :: Wed, 25 Sep 2019 16:56:41 GMT Full Article headline government britain fraud
ame Morrisons Is To Blame For 100k Payroll Theft And Leak By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:36 GMT Full Article headline hacker privacy britain data loss
ame US, UK Blame Russia For Mass Defacement Of Georgian Websites By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 15:10:15 GMT Full Article headline government usa britain russia cyberwar
ame Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:44:33 GMT Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. Full Article
ame Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
ame URLCrazy Domain Name Typo Tool 0.7.1 By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:22:22 GMT URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo. Full Article
ame TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
ame American Cities of the Future 2019/20 - the winners By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:24:30 +0000 New York continues to reign as leader of fDi’s American Cities of the Future 2019/20 ranking. San Francisco retains second place with Toronto rising to third. Naomi Davies reports. Full Article
ame American Cities of the Future 2019/20 – FDI strategy By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:25:52 +0000 A more detailed look at fDi's judges’ top five American Cities of the Future 2019/20 for FDI strategy. Naomi Davies reports. Full Article
ame A Twitch Streamer Is Exposing Coronavirus Scams Live By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:46 GMT Full Article headline virus fraud
ame View from the Americas: new perspectives in a time of pandemic By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:03:51 +0000 The coronavirus pandemic could change human behaviour more permanently in future. Full Article
ame Latin America prepares for sharp drop in FDI amid coronavirus pandemic By www.fdiintelligence.com Published On :: Wed, 08 Apr 2020 12:03:41 +0000 The fallout from the pandemic looks set to stall trade and investment to Latin America. Full Article
ame Zonamerica looks beyond Latin America for expansion opportunities By www.fdiintelligence.com Published On :: Mon, 16 Dec 2019 10:05:06 +0000 Uruguay-based Zonamerica has successfully expanded into Colombia and China, and is now looking to export its model to other parts of Asia and Africa. Full Article
ame View from the Americas: the evolving political economy of FDI By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:00:59 +0000 We are currently in a state of heightened business and economic disruption and sociopolitical activism, which only looks set to intensify. Full Article
ame Microsoft makes a crossborder connection in North America By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:36 +0000 While governments grow more protectionist over trade and physical borders, companies such as Microsoft are bridging the gap by funding international collaborative enterprises. Full Article
ame View from the Americas: time for action on SDGs By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:16 +0000 Giant investment firm BlackRock throwing its weight behind sustainability issues is sending a signal to the corporate world to respond urgently to global calls for action, writes Gregg Wassmansdorf. Full Article
ame Latin America embraces China's Belt and Road with enthusiasm By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:20:49 +0000 Up to 18 countries across Latin America have joined China’s new Belt and Road Initiative, hoping to boost their infrastructure development and investment. Full Article