Archives for 

Security Research

Adobe released Emergency Flash Player update for critical zero day threat – CVE-2014-0497

Adobe released an emergency patch for a critical vulnerability affecting Flash Player for Windows, Linux and OS X, the exploitation of which can result in an attacker gaining remote control of the compromised systems. The security flaw exists in Adobe Flash Player 12.0.0.43 and earlier versions  Adobe thanks Alexander Polyakov and Anton Ivanov of Kaspersky Labs […]
Share Button
Continue reading →

PNG Image Metadata leads to New iFrame Injections

Peter Gramantik, a malware researchers from Sucuri has discovered a new way to distribute malware that relies on reading  JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections. This injection makes it very harder for antivirus detection because the injection  method is  deeply engrained in the image’s metadata. This iframe can be seen […]
Share Button
Continue reading →

Remote code-execution vulnerability on Ebay website discovered by a Pentester

A security pen tester from Germany @secalert discovered remote code execution vulnerability on ebay website. As per David Vieira-Kurtz blog , “I found a controller which was prone to remote-code-execution due to a type-cast issue in combination with complex curly syntax. ”   David exploited the RCE flaw on ebay.com website and displayed output of phpinfo() […]
Share Button
Continue reading →

Digital Attack Map – New data visualization DDOS tool from Google Ideas and Arbor Networks (www.digitalattackmap.com)

Visualizing cyber attacks around the world has become easier than before and its made real by Google & Arbor Networks.  A joint collaboration between the two companies resulted in ‘Digital Attack map” tool. The usability of the tool is not still expanded but the beautiful graphical page shows various points of ho the attack takes […]
Share Button
Continue reading →

How much risk is Apple’s new fingerprint authentication on the new IPhone 5s ?

We have seen fingerprint reader, face recognition authentication for a while. Smartphone manufacturers have been rumoring about this and Apple finally introduces it. Apple announced their new IPhone 5s  with fingerprint reader yesterday.  It’s a cool factor to have fingerprint instead of the password or pattern based authentication. Apple claims that fingerprint is stored local […]
Share Button
Continue reading →

L.A. Times Hit By massive Malvertising Campaign

Maladvertisers targeted L.A. Times sending its thousands of users to Blackhole exploit kit and other malicious sites. Security researcher’s from Blue Coat have discovered a set of malicious domains sending traffic to the searcherstypediscksruns dot com/.net/.org family of Blackhole sites, including adhidclick.com, ortclick.com and several other affiliated sites. These sites were registered During December 2012 […]
Share Button
Continue reading →

Large botnet causing increasing traffic on TOR Network

Recently Roger from posted a question regarding increased traffic on TOR network. After NSA’s surveillance the first suspect was assuming internet users have started using tor network to surf anonymously. However the exponential increased intraffic showed its something more than just the users. The suspect was it must be a botnet. Even Arma posted saying […]
Share Button
Continue reading →

Android Trojan Obad.a Trojan spreading via mobile botnets discovered

According to Securelist.com, Obad.a infects in two steps along with another mobile Trojan named as TrojanSMS.AndroidOS.Opfake.a.  This Trojan was noted as one of the most sophisticated Trojan by Kaspersky this May. The infection starts when a legitimate user gets a text message with following text. “MMS message has been delivered, download from www.otkroi.com”. When a […]
Share Button
Continue reading →

Cisco Secure Access Control Server Remote Command Execution Vulnerability affecting Windows

A critical vulnerability has been discovered in Cisco Secure ACS which allows a remote attacker to gain complete control of a vulnerable device. The successful exploitation of the vulnerability may allow an unauthenticated, remote attacker to execute arbitrary commands and take full control of the operating system that hosts the Cisco Secure Access Control Server […]
Share Button
Continue reading →

Uni-IDM ( IDSpace ) – a new anti-phishing technology tool used for Identity Management

Researchers from London’s Royal Holloway University designed a tool to fight against phishing using a tool called Uni-IDM(IDSpace). This identity management tool has been introduced to improve security and usability for user authentication. At this point in time, password based authentication has been used all over the world for authentication. As per the university research […]
Share Button
Continue reading →