1. | Trident - Sophisticated, persistent mobile attack against high-value targets on iOS
(blog.lookout.com)
submitted by daniel over 4 years ago; voted 1 times | Up | 0 comments |
2. | HTTPoxy - Web/CGI Data Leakage Vulnerability
(nakedsecurity.sophos.com)
submitted by daniel over 4 years ago; voted 0 times | Up | 1 comments |
3. | DROWN Attack - Decrypting TLS on Servers with SSLv2 Enabled
(blog.cryptographyengineering.com)
submitted by daniel almost 5 years ago; voted 0 times | Up | 0 comments |
4. | Vulnerability in Glibc Allows Remote Execution on Domain Name Resolution
(dankaminsky.com)
submitted by daniel almost 5 years ago; voted 0 times | Up | 0 comments |
5. | OS X Apps Using Sparkle Updater are Vulnerable to MITM and RCE
(vulnsec.com)
submitted by daniel almost 5 years ago; voted 0 times | Up | 0 comments |
6. | SHA1 - A History of Hard Choices
(medium.com)
submitted by daniel about 5 years ago; voted 0 times | Up | 1 comments |
7. | Unauthorized Code in Juniper Devices Allowing Decryption of VPN Traffic
(forums.juniper.net)
submitted by daniel about 5 years ago; voted 0 times | Up | 0 comments |
8. | Certificate on Dell Laptops Breaks Encrypted HTTPS Connections
(blog.hboeck.de)
submitted by daniel about 5 years ago; voted 1 times | Up | 0 comments |
9. | New attacks on Network Time Protocol can defeat HTTPS and create chaos
(arstechnica.com)
submitted by daniel about 5 years ago; voted 14 times | Up | 0 comments |
10. | Setting up DNSCrypt
(danonsecurity.com)
submitted by daniel over 5 years ago; voted 24 times | Up | 0 comments |
11. | Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users
(researchcenter.paloaltonetworks.com)
submitted by daniel over 5 years ago; voted 23 times | Up | 0 comments |
12. | The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes Zimperium Mobile Security Blog
(blog.zimperium.com)
submitted by daniel over 5 years ago; voted 23 times | Up | 0 comments |
13. | The Way GCHQ Obliterated The Guardians Laptops May Have Revealed More Than It Intended
(firstlook.org)
submitted by daniel over 5 years ago; voted 33 times | Up | 0 comments |
14. | Major Android remote-access vulnerability is now being exploited
(arstechnica.com)
submitted by daniel over 5 years ago; voted 30 times | Up | 0 comments |
15. | Black Hat USA 2015: The full story of how that Jeep was hacked | Kaspersky Lab Official Blog
(blog.kaspersky.com)
submitted by daniel over 5 years ago; voted 24 times | Up | 0 comments |
16. | Errata Security: A quick review of the BIND9 code
(blog.erratasec.com)
submitted by daniel over 5 years ago; voted 24 times | Up | 0 comments |
17. | Hackers Remotely Kill a Jeep on the Highway
(wired.com)
submitted by daniel over 5 years ago; voted 31 times | Up | 0 comments |
18. | Hacking Team Is Hacked - Schneier on Security
(schneier.com)
submitted by daniel over 5 years ago; voted 38 times | Up | 0 comments |
19. | How OPM hackers tapped the mother lode of espionage data
(arstechnica.com)
submitted by daniel over 5 years ago; voted 60 times | Up | 0 comments |
20. | Remote Code Execution as System User on Samsung Phones | NowSecure Blogs
(nowsecure.com)
submitted by daniel over 5 years ago; voted 49 times | Up | 0 comments |
sort by: new | voted | magic | mine || render: new