Thursday, August 13, 2020
Factorization Attack

New Factorization Attack with Security Tokens Allows Attacker to compute Millions of Smart Cards...

Newly Discovered Factorization Attack in  Cryptographic library that is used for generation RSA Key allows Attacker to compute Millions of cryptographic smartcards, security tokens, and Motherboard Chipsets Private key by having a target’s public key. The Public and Private key pair...
wikileaks

Vault 7 Leaks: CIA Tool “Protego” Used to Control Missile System and to...

WikiLeaks Revealed a New CIA Document called "Protego" is PIC micro controller based Missile Control System Project and along with this, it contains  37 related proprietary hardware/software manuals. Raytheon has Developed the missile control system that severing under the Protego Project. Few Day before...
Trojan

Mobile Banking Malware “Svpeng” Working as a Keylogger and Steals Contacts and Call...

New Banking Malware called "Svpeng" -Trojan-Banker.AndroidOS.Svpeng.ae Discovered with New Advance Futures that working as Keylogger and steals sensitive information such as Entering texts, to send SMS, Call logs and Contacts Details from victims Mobile. Taking Advantages of accessibility services and abusing...

Critical Cisco security Authentication Bypass Vulnerability leads to hack thousands of home routers

Remote unauthenticated control over a vulnerable ISP's gear, could allow an attacker to log into the software as an administrator and remotely take control of thousands upon thousands of customers' home routers, broadband gateways and similar boxes. Cisco said ,The...

Researchers Find Backdoor Account in 80 Different “SONY” IP...

  Researchers in Austria have unearthed a pair of backdoor accounts in more than 80 different IP camera models made by Sony Corp.     Separately, Israeli security experts have discovered trivially exploitable weaknesses in nearly a half-million white-labeled IP camera models that are not currently...
ethicalhackersacademy