News Clipping

Hacker Can Steal Data from Air-Gapped Computers [source: thehackernews]

Do you think it is possible to extract data from a computer using its power cables? If no, then you should definitely read about this technique. Researchers from Israel’s Ben Gurion University of the Negev—who majorly focus on finding clever ways to exfiltrate data from an isolated or air-gapped computer—have now shown how fluctuations in the current flow “propagated through the power lines” could be...

Read More


CCleaner Attack Timeline—Here’s How Hackers Infected 2.3 Million PCs [source: thehackernews]

Last year, the popular system cleanup software CCleaner suffered a massive supply-chain malware attack of all times, wherein hackers compromised the company’s servers for more than a month and replaced the original version of the software with the malicious one. The malware attack infected over 2.3 million users who downloaded or updated their CCleaner app between August and September last year from the official website with the...

Read More


iOS Trustjacking Attack Exposes iPhones to Remote Hacking [source: bleepingcomputer]

Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw —which they named Trustjacking— to take over devices without the phone owner’s knowledge. At the technical level, the Trustjacking security issue is rooted in the “iTunes Wi-Fi sync” feature included with iTunes. If this option is enabled in the iTunes settings...

Read More


Microsoft Outlook retrieves remote OLE content without prompting[source: kb.cert]

Overview When a Rich Text (RTF) email is previewed in Microsoft Outlook, remotely-hosted OLE content is retrieved without requiring any additional user interaction. This can leak private information including the user’s password hash, which may be cracked by an attacker. Description Microsoft Outlook will automatically retrieve remote OLE content when an RTF email is previewed. When remote OLE content is hosted on a SMB/CIFS server,...

Read More


Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution[cisecurity]

Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution within the context of a privileged process....

Read More


Page 51 of 123« First...102030...4950515253...607080...Last »