GnuPG Email Encryption Project Relies on 'Werner Koch', and He is Running Out of Funds
Werner Koch, the man who authored the free email encryption software, is running out of funding to continue the development of his crucial open-source GNU Privacy Guard (GnuPG) encryption tools.The code works on plenty of operating systems from Linux and FreeBSD to Windows and OS X. The popular...
6.9AI Score
Medium Alert ID: 37183 First Published: 2015 January 27 20:58 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages distributing malicious software. Email messages that are related to this threat (RuleID13294) may contain the following...
0.3AI Score
Court Rules Banks May Proceed with Target Lawsuits
A Minnesota District Court ruling this week related to the 2013 Target data breach has opened the door for banks to pursue damages from retailers victimized by a data breach. Judge Paul A. Magnuson ruled that Target was negligent in ignoring and, in some cases, turning off security features that...
0.5AI Score
X (Formerly Twitter): Singup Page HTML Injection Vulnerability
Information There's an HTML Injection Vulnerability exists in Twitter main signup page which can be used by attackers to display personally crafted messages to twitter users for different malicious purposes. Affected parameters invite_code= & invite_name=. Steps to reproduce: 1. Refer to the main.....
6.9AI Score
CSP Bypass in android browser prior to 4.4
Hello. I hope this is the correct place to report this bug. I've found a Content Security Policy bypass similar to the same and related to the same origin policy bypass in this CVE. This is a separate vulnerability, however. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041 I've tested.....
-0.2AI Score
0.924EPSS
Android browser versions 4.4 content security policy bypass vulnerability
Android browser versions prior to 4.4 suffer from a content security policy bypass...
7AI Score
-0.3AI Score
0.924EPSS
Threat Outbreak Alert RuleID11115: Email Messages Distributing Malicious Software on August 14, 2014
Medium Alert ID: 35297 First Published: 2014 August 14 14:34 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages distributing malicious software. Email messages that are related to this threat (RuleID11115) may contain the following...
0.5AI Score
Keeping your restaurant & hospitality Cardholder Data Environment safe
Reports of new credit card data breaches seem to be in the news daily. Recent high profile breaches within major retailers this year should serve as a wake-up call to the restaurant and hospitality industries. As a result of having high volumes of credit card transactions and decentralized...
0.8AI Score
Slack: Content Spoofing all Integrations in https://team.slack.com/services/new/
Hello There, I've discovered 48+ content spoofing and confirmed all of your Integrations at https://team.slack.com/services/new/ is vulnerable to Content spoofing and exploitable to all users. Content Spoofing An attack technique used to trick a user into thinking that fake web site content is...
-0.1AI Score
Donation <= 1.0 - SQL Injection
The WordPress Donation Plugin with Goals and Paypal IPN by NonprofitCMS.org WordPress plugin was affected by a SQL Injection security...
2.3AI Score
Slack: Content spoofing at Stripe Integrations
I have found Content Spoofing Vulnerable in Slack at Stripe Integrations vulnerability is exploitable to all users Proof of concept: https://asdasda.slack.com/services/2481499413?error=content%20spoofing%20! Regards, Jayson...
1.9AI Score
7.1AI Score
openSUSE Security Update : kernel (openSUSE-SU-2013:1971-1)
The Linux Kernel was updated to fix various security issues and bugs. sctp: Use correct sideffect command in duplicate cookie handling (bnc#826102, CVE-2013-2206). Drivers: hv: util: Fix a bug in util version negotiation code (bnc#838346). vmxnet3: prevent div-by-zero panic when ring...
-0.4AI Score
0.741EPSS
Fraudsters Physically Deploy Malicious Software to Hack ATMs
Criminals will not let any way to cheat an ATM machine out of its cash, as it’s one of the easiest way for them to get the hands on cash. ATM skimmers have now discovered a new and high-tech approach to target cash machines directly by inserting a physical notorious device into it instead....
6.8AI Score
Pre-Play Vulnerability Allows Chip-and-PIN Payment Card Cloning
In March this year, we reported that the major card distributor companies, VISA and Mastercard are migrating to EMV chip cards, also known as PIN-and-Chip cards. Unlike traditional magnetic stripe payment cards, EMV chip cards generates a unique code for every transaction, making it nearly*...
6.8AI Score
Target finally Plans to issue Chip and PIN Credit Cards
The massive data breaches in U.S largest retailers 'Target', marked the largest card heists in the U.S. history in which financial credentials of more than 110 million customers were compromised, have forced the retailer to take step towards more secure transactions. The retailer company on...
7.1AI Score
"4chan Hacked", Most Popular Image-Bulletin Board Compromised
The founder of 4chan, Christopher Poole, aka “moot” has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked. The attacker gained access to the administrative functions and successfully hacked into one of 4chan’s database by exploiting a website's software....
6.7AI Score
3 Million Cards Implicated in Michaels Breach
Nearly four months after it first reported it was investigating a data breach, the arts and crafts retail chain Michaels confirmed yesterday that most of its U.S. stores were compromised on and off for eight months and that payment card information of nearly three million of its customers may have....
-0.4AI Score
Payment Card processing services upgrading to Chip-and-PIN and Point-to-Point Encryption
The massive data breaches in U.S retailers 'Target' and 'Neiman Marcus', in which financial credentials of more than 110 million and 1.1 million customers were compromised respectively, have put a spotlight on the need for more secure transactions. To tackle this issue, the two major payment card.....
7.1AI Score
OpenBSD Project survived after $20,000 Donation from Romanian Bitcoin Billionaire
Last year in the month of December the Security-focused Unix-like distribution 'OpenBSD' Foundation announced that it was facing shut down due to lack of funds to pay their electricity bills and dedicated Internet line costs. Theo de __Raadt, the founder of the OpenBSD project, and Bob Beck...
6.9AI Score
The pro-Assad group Syrian Electronic Army claims it has hacked the President Barack Obama's website , Twitter-Facebook accounts and access email accounts linked to Organizing For Action, the non-profit offshoot of Obama For America, Obama's 2012 campaign operation. Last night, Syrian Electronic...
6.7AI Score
Threat Outbreak Alert: Fake Payroll Invoice Email Messages on June 11, 2014
Medium Alert ID: 31268 First Published: 2013 October 15 19:34 GMT Last Updated: 2014 June 12 12:44 GMT Version: 61 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain payroll invoice details for the recipient. The text in the email...
0.3AI Score
Hacker jailed for ATM skimming invented ATM security scheme
A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta who is being detained in a prison from Vaslui, Romania, after he was convicted on charges of...
6.7AI Score
Hacker jailed for ATM skimming invented ATM security scheme
A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta who is being detained in a prison from Vaslui, Romania, after he was convicted on charges of...
6.7AI Score
Apparel Company Files Landmark Lawsuit Against Visa in PCI Dispute
A Tennessee-based footwear and apparel company has filed a $13 million lawsuit against Visa for what it considers random, subjective penalties for being out of compliance with the Payment Card Industry (PCI) standard the credit card company regulates. Last week Nashville-based Genesco, which...
0.8AI Score
CTF365 – Capture The Flag – Next Generation
Prepare your tools, build your team, defend your country and conquer the World. It is well known that the best way to learn security is hands on. It's the kind of experience you earn in pentest labs or CTF competitions based on challenges or defensive and offensive security and it's aimed at...
6.7AI Score
International Cyber Crime Takedown Said to Be Largest of Its Kind
A two-year undercover operation today netted two dozen arrests in eight countries in what federal authorities say is the largest coordinated international takedown in history directed at those who traffic stolen financial data through online forums. The investigation uncovered 411,000 compromised.....
-0.5AI Score
Julian Assange and Bradley Manning are Vested in Vision !
Julian Assange and Bradley Manning are Vested in Vision ! Two significant events will take place this week and cyber activists need to take note and pay attention. This will be your training on how to unfold the growing revolution that is spinning our world on a new and courageous path. First,...
6.7AI Score
Adobe Releases Malware Classifier Tool
Adobe has published a free tool that can help administrators and security researchers classify suspicious files as malicious or benign, using specific machine-learning algorithms. The tool is a command-line utility that Adobe officials hope will make binary classification a little easier. Adobe...
0.2AI Score
0.2AI Score
WordPress Donation Plugin <= 1.0 - SQL Injection
Donation plugin is prone to an SQL injection. This vulnerability allows an attacker to modify data, alter queries to the application SQL database, compromise the access and application or exploit hidden vulnerabilities in the underlying database. Solution Upgrade the...
3.3AI Score
0.1AI Score
7.4AI Score
Researchers: Square Card Reader Provides Straight Line to Illicit Cash?
Security researchers at the Black Hat Briefings demonstrated a method for turning purloined credit card information into cash, this time using Square, a free credit card reader that promises to turn anyone with a mobile device into a merchant capable of accepting credit card payments. Adam Laurie.....
-0.3AI Score
Oracle Linux 5.7 kernel security and bug fix update
[2.6.18-274.el5] - [xen] svm: fix invlpg emulator regression (Paolo Bonzini) [719894] [2.6.18-273.el5] - Revert: [fs] proc: Fix rmmod/read/write races in /proc entries (Jarod Wilson) [717068] - [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [717742] - [xen] prep...
-0.3AI Score
0.062EPSS
Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers
Paypal gives FBI the list of IP Address of 1,000 Anomymous hackers Paypal collected 1000 IP addresses of those carrying out Anonymous' DDoS attacks against PayPal last December. To be fair the names on the list will probably be the bottom feeding script kiddies rather than the hackers at...
6.8AI Score
U.S. Playing Catch Up in Security for Contactless Devices
AMHERST, MASS.– The U.S. may boast the world’s largest economy, richest technology companies and a lion’s share of its top research universities. But when it comes to the subject of security of RFID (Radio Frequency ID) and other contactless technologies, America is still playing catch-up. The...
-0.8AI Score
Website collecting donations for Japan hacked !
Hackers took down the website of a Tennessee nonprofit that was collecting donations for Japan and replaced the home page with profanity. Japan-America Society of Tennessee executive director Leigh Weiland said hackers broke into the site sometime Wednesday night. The group's web-hosting...
6.8AI Score
Tomato Gallery 1.2 (logged only) Persistant Xss Vunerability
Exploit for php platform in category web...
7.1AI Score
Former Hacker Li Jun Donates to Panda Research Center
In 2006, Li Jun, a Chinese man, was jailed for creating the ‘Fujacks’ worm. Recently, he appears to be attempting to rehabilitate his public image by making a donation to a panda research center in China. Li Jun was arrested in February 2007 and charged with writing and selling the "Panda Burning.....
6.8AI Score
Genesco Inc. Confirms Payment Card Data Breach in U.S. Stores
Specialty retailer Genesco Inc. announced on Friday that it experienced a criminal intrusion into the part of its computer network that processes payment card transactions. Some card details might have been compromised. However, the company quickly secured the affected network segment and...
7.1AI Score
Wikileaks Roundup: Assange Arrested, Visa, MC Cut Ties
OK. It’s been just over a week since information leaking Web site Wikileaks released the first installment of leaked U.S. diplomatic cables, with each day bringing new documents from the purported hoard of some 250,000 pages, and new developments from a range of very pissed off Western...
-0.2AI Score
Earn Rewards for Finding Security Flaws in Gmail, YouTube, and More
Google is on the hunt for hackers to find security vulnerabilities in popular web applications like Gmail, Blogger, and YouTube. The tech giant is offering rewards starting at $500 per bug. For vulnerabilities that are "severe or unusually clever," the payout can reach up to $3,133.70....
7.1AI Score
iPhone Jailbreak Tool Sets Stage for Mobile Malware
SAN DIEGO–The success of a group of hackers in compromising the security of Apple’s iPhone may set the stage for more malware for the popular handset, including rootkit-style remote monitoring tools and data stealing malware. In a presentation at the ToorCon Hacking Conference here on Saturday,...
-0.3AI Score
Researcher Develops Small Device to Intercept, Modify Electronic Payments
With bank fraud and attacks against financial institutions and online banking applications having turned into an epidemic, researchers, banks and other concerned parties have been looking for new ways to protect the integrity of financial transactions. A researcher at the University of Cambridge...
0.3AI Score
Researchers Find Weaknesses in Magstripe Gift Cards
It’s not just credit cards and debit cards that are at risk of fraud: pre-paid gift cards can also easily be cloned and stolen by cybercriminals, according to newly published research [pdf] from U.K-based Corsaire. The researchers found that the magnetic-stripe technology used for gift cards and...
0.6AI Score
An Open Letter to Heartland CEO Robert Carr
Mr. Carr, I read your interview with Bill Brenner in CSO magazine today, and I sympathize with your situation. I completely agree that the current system of standards and audits contained in the Payment Card Industry Data Security Standard is flawed and unreliable as a breach-prevention mechanism.....
0.7AI Score
CakePHP 1.1.20 Local File Inclusion Vulnerability
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + CakePHP 1.1.20 Local File Inclusion Vulnerability + ...
1.1AI Score
-0.2AI Score