BitTorrent fixed a vulnerability that would have allowed attackers to hijack BitTorrent applications used by hundreds of millions of users in order to amplify distributed denial-of-service (DDoS) attacks.
Stories by Lucian Constantin
Several DSL routers from different manufacturers contain a guessable hard-coded password that allows accessing the devices with a hidden administrator account.
Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services.
An application hosted in Google Play until yesterday took advantage for months of a flaw in the TeamViewer remote support tool for Android in order to enable screen recording on older devices.
Recent visitors to Plenty of Fish, an online dating website with over 3 million daily active users, had their browsers redirected to exploits that installed malware.
A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials.
Hackers breached the computer systems of Internet services provider Web.com Group and stole credit card information of 93,000 customers.
Adobe Systems released a security patch for LiveCycle Data Services, a development tool used by businesses to synchronize data between back-end servers and rich Internet applications built with Adobe Flex or AIR.
Attackers are taking advantage of home routers and other devices that respond to UPnP requests over the Internet in order to amplify DDoS attacks.
The Android service that processes multimedia files has been the source of several vulnerabilities recently, including a new one that could give rogue applications access to sensitive permissions.
BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
Attackers could launch crippling attacks by reflecting the traffic through millions of computers running BitTorrent programs
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.
Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conferences, did not disappoint.
- Certification and Accreditation Security Consultant ACT
- Network and Security Design Engineer NSW
- Test Specialist SA
- Technical Business Analyst | Marketing Services NSW
- Business Analyst QLD
- Data Analyst | Data Feeds | Catalogue and Map NSW
- Test Specialist SA
- Senior Front End Developer NSW
- Test Manager (HP Quality Centre / ARIBA) NSW
- Program Manager - Data Insight VIC
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- The Future is Encrypted. Manage It.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- See Your Traffic for What It Really Is
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- Check your Future Risk
- The Future is Encrypted. What's your defense?