one CarolinaCon Has Been Postponed By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:12:21 GMT CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19. Full Article
one Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
one Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
one Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
one Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
one Cisco IP Phone 11.7 Denial Of Service By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:25:59 GMT Cisco IP Phone version 11.7 denial of service proof of concept exploit. Full Article
one JhoneRAT Exploits Cloud To Attack Middle Eastern Countries By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:18 GMT Full Article headline malware trojan cyberwar
one US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:47 GMT Full Article headline government usa phone china cyberwar backdoor
one Malbait TCP/UDP Honeypot By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 17:02:22 GMT Malbait is a honeypot written in perl. It creates fake servers and supports both TCP and UDP protocols, either singly or in combination. It outputs in CSV format as well as giving more detailed text reports. You can serve fake Telnet, FTP, SMTP, POP3, HTTP, TR-69, IMAP, asciitime, systat and echo servers, as well as serving blank or random output. Full Article
one One Lulzsec Suspect Has Already Been Released By packetstormsecurity.com Published On :: Thu, 08 Mar 2012 02:14:30 GMT Full Article headline hacker ireland anonymous
one Trust Fined £225k For Leaving Files In Abandoned Hospital By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 15:39:27 GMT Full Article headline government data loss ireland
one Hackers Deface Indonesian President's Website By packetstormsecurity.com Published On :: Fri, 11 Jan 2013 15:54:11 GMT Full Article headline hacker indonesia
one Cyber Jihad Between Indonesia And Bangladesh By packetstormsecurity.com Published On :: Wed, 31 Jul 2013 04:59:45 GMT Full Article headline cyberwar terror indonesia
one Australia Sites Hacked Amid Spying Row With Indonesia By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 16:06:34 GMT Full Article headline hacker government australia spyware anonymous indonesia
one Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
one Capstone 4.0.2 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:01:48 GMT Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more. Full Article
one Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
one With Everyone WFH, VPN Security Has Become Paramount By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:38:00 GMT Full Article headline privacy cryptography
one UFONet 1.4 By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 14:17:29 GMT UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc. Full Article
one Creative Zone SQL Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:53:09 GMT Creative Zone suffers from a remote SQL injection vulnerability. Full Article
one Apple iPhone 4 Passphrase Disclosure By packetstormsecurity.com Published On :: Mon, 07 Mar 2011 15:58:33 GMT Apple iPhone 4 with iOS 4.3 (8F190) suffers from a passphrase disclosure vulnerability that allows all local processes access to it. Full Article
one Checkview 1.1 For iPhone / iPod Touch Directory Traversal By packetstormsecurity.com Published On :: Tue, 15 Mar 2011 01:28:26 GMT Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability. Full Article
one iPhone/iPad Phone Drive 1.1.1 Directory Traversal By packetstormsecurity.com Published On :: Tue, 09 Aug 2011 16:54:28 GMT iPhone/iPad Phone Drive version 1.1.1 suffers from a directory traversal vulnerability. Full Article
one iPhone Forensics On iOS 5 By packetstormsecurity.com Published On :: Fri, 20 Jan 2012 13:22:22 GMT This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone. Full Article
one IPhone TreasonSMS HTML Injection / File Inclusion By packetstormsecurity.com Published On :: Mon, 23 Apr 2012 18:55:33 GMT IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities. Full Article
one Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
one Air Transfer Iphone 1.3.9 Arbitrary File Download By packetstormsecurity.com Published On :: Mon, 25 Aug 2014 09:33:33 GMT Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities. Full Article
one WordPress Windows Desktop And iPhone Photo Uploader File Upload By packetstormsecurity.com Published On :: Thu, 09 Apr 2015 03:33:33 GMT WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability. Full Article
one Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
one Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:44:33 GMT Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. Full Article
one iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
one What makes a successful free zone? By www.fdiintelligence.com Published On :: Thu, 17 Oct 2019 11:00:38 +0000 Dr Samir Hamrouni, CEO of the World Free Zones Organization, outlines the attributes that are essential to flourishing free zones. Full Article
one fDi’s Global Free Zones of the Year 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 14 Oct 2019 08:40:15 +0000 The UAE's DMCC takes home the top prize in fDi’s Global Free Zones of the Year for a fifth consecutive year. Full Article
one Someone Defaced Linux.org With Goatse By packetstormsecurity.com Published On :: Fri, 07 Dec 2018 17:30:48 GMT Full Article headline hacker linux
one Outlaw Shellbot Infects Linux Servers To Mine For Monero By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:47 GMT Full Article headline hacker malware linux botnet fraud cryptography
one Agent Smith Malware Infects 25 Million Android Phones By packetstormsecurity.com Published On :: Wed, 10 Jul 2019 18:50:09 GMT Full Article headline malware linux phone google
one SkyJack Drone Hijacker By packetstormsecurity.com Published On :: Wed, 04 Dec 2013 03:19:46 GMT Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control. Full Article
one Latvia highlights anti-money laundering efforts By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:17 +0000 FDI into Latvia has recovered in recent years as the Baltic state has implemented stricter anti-money laundering procedures. Latvian minister of economics Ralfs Nemiro talks to Alex Irwin-Hunt about the progress made. Full Article
one Free zones offer safe haven to investors By www.fdiintelligence.com Published On :: Tue, 17 Dec 2019 10:14:37 +0000 The chief executive of Ras Al Khaimah Economic Zone (RAKEZ), shares his views over the perks of free zones in emerging markets. Full Article
one Will mobile phone penetration maintain African momentum? By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:20:18 +0000 Sub-Saharan Africa is the world’s fastest growing mobile phone market, but how can telecoms companies make the most of the huge opportunities the region provides? Full Article
one How the Suez Canal Economic Zone is aiding Egypt's economic resurgence By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:41 +0000 Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. Full Article
one Google Blocked 126 Million COVID-19 Phishing Scams In One Week By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:41 GMT Full Article headline email virus cybercrime fraud google phish
one Blue Mockingbird Monero-Mining Campaign Exploits Web Apps By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:17 GMT Full Article headline malware fraud cryptography
one Trentino pioneers sustainable approach to cinema investment By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:26:50 +0000 Sustainability is gaining traction in the creative industries, with the Italian region of Trentino designing a film production rating protocol that is being considered by the EU. Full Article
one Spotlight: Serbian free zones By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 16:04:00 +0000 Serbia’s 15 free zones are driving forward an ongoing flurry of foreign investment in the country’s buoyant manufacturing scene, especially in automotives. Full Article
one Emerging APT Mounts Mass iPhone Surveillance Campaign By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 12:52:59 GMT Full Article headline malware phone spyware apple
one Free zones will be key to post-virus world By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:12 +0000 Covid-19 crisis has laid bare the weaknesses of global value chains around the world Full Article
one Mara's Phones makes African manufacturing a priority By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:24 +0000 Having opened new production facilities in Rwanda and South Africa, Mara Phones is looking to alter Africa's mindset from being a 'consumer' to being a 'manufacturer'. Full Article
one End of the road for Vodafone India? By www.fdiintelligence.com Published On :: Wed, 18 Mar 2020 16:48:27 +0000 A government bailout for the ailing subsidiary of the telecoms powerhouse has fallen through. Full Article
one Developing nations dominate free zone investment flows By www.fdiintelligence.com Published On :: Wed, 20 Nov 2019 13:01:43 +0000 Global free zones may be spurring development in less economically developed countries Full Article