image
By Ian Trump This is the second in a series of blog posts “on all things Bot.” From bad to good and looking towards the future, Bots remain an information security issue which has the potential to impact all commercial and recreational online activity. This series will explore the security and business ramifications of the modern internet where […] This is a post from HackRead.com Read the original post: Bad to the Bot Bone

Source

The bugs let hackers crash IoT devices, leak their information, and completely take them over.

Source

Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.

Source

Security researchers have discovered a serious code execution vulnerability in the LIVE555 Streaming Media library—which is being used by popular media players including VLC and MPlayer, along with a number of embedded devices capable of streaming media.

LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to

Source

Update (Oct 2018) — Over 30,000 students from all around the world have joined this training program so far.

Due to the growing number of threats in the computer world, ethical hackers have become the most important player for not only governments but also private companies and IT firms in order to safeguard their systems and networks from hackers trying to infiltrate them.

By 2020,

Source

image
By Waqas Another day, another court order against The Pirate Bay (TPB). This time, the Patent and Market Court of Sweden has ordered the telephone company and mobile network operator Telia to block The Pirate Bay and other torrenting websites including NyaFilmer, FMovies, and Dreamfilm in the country. According to TorrentFreak, the interim order came after a complaint filed by a […] This is a post from HackRead.com Read the original post: Swedish court tells ISP to block The Pirate Bay in the country

Source

A security researcher has discovered several critical vulnerabilities in one of the most popular embedded real-time operating systems—called FreeRTOS—and its other variants, exposing a wide range of IoT devices and critical infrastructure systems to hackers.

What is FreeRTOS (Amazon, WHIS OpenRTOS, SafeRTOS)?

FreeRTOS is a leading open source real-time operating system (RTOS) for embedded

Source

A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.

Source

image
By Waqas Colton Ray Grubbs, 21 from Stanford, Kentucky has been sent to 30 months (2.5 years) in prison for developing and operating the infamous Luminosity RAT or Luminosity Link RAT (Remote Access Trojan) that targeted unsuspected users worldwide. Luminosity RAT allowed hackers to infect targeted devices by automatically disabling the anti-malware or anti-virus program installed on the system to spy […] This is a post from HackRead.com Read the original post: Author of Luminosity RAT Gets 2.5 Years in Federal Prison

Source

Tumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.

Source