Hacking Wisdom
Follow
Find
5.3K views | +1 today
 
Scooped by Hacking Wisdom
onto Hacking Wisdom
Scoop.it!

How eBay Could Rescue Bitcoin From the Feds | Wired Enterprise | Wired.com

How eBay Could Rescue Bitcoin From the Feds | Wired Enterprise | Wired.com | Hacking Wisdom | Scoop.it
Mt. Gox, like other Bitcoin exchanges, is having a hard time with U.S. banks because there are big questions about whether the exchanges meet federal and state money transmission business regulations.
more...
No comment yet.
Hacking Wisdom
Your new post is loading...
Your new post is loading...
Scooped by Hacking Wisdom
Scoop.it!

Major Flaw In Android Phones Would Let Hackers In With Just A Text

Major Flaw In Android Phones Would Let Hackers In With Just A Text | Hacking Wisdom | Scoop.it
A security gap on the most popular smartphone operating system was discovered by security experts in a lab and is so far not widely exploited. It would let malicious code take over a phone instantly.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Firefox exploit found in the wild

Firefox exploit found in the wild | Hacking Wisdom | Scoop.it
Yesterday morning, August 5, a Firefox user informed us that an advertisement on a news site in Russia was serving a Firefox exploit that searched ...
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

What happened when we got subpoenaed over our Tor exit node

What happened when we got subpoenaed over our Tor exit node | Hacking Wisdom | Scoop.it
We've run a Tor exit-node for years. In June, we got the nightmare Tor operator scenario: a federal subpoena (don't worry, it ended surprisingly well!)
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Mt. Gox ran out of money six months before going bust | The Japan Times

Mt. Gox ran out of money six months before going bust | The Japan Times | Hacking Wisdom | Scoop.it
Bitcoin exchange Mt. Gox Co. apparently ran out of money six months before it announced in February 2014 that it was filing for bankruptcy after tens of mi
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Memory Hole Memory Hole Examples Memory Hole Implementation Guidance

Memory Hole: Protected E-mail Headers
Hacking Wisdom's insight:

Encrypted or signed e-mail does not have cryptographic protection of headers; only the body of an e-mail message is encrypted or signed.

The Memory Hole project aims to fix this problem by stashing relevant headers within the body of the e-mail in a standardized way. Compatible mail user agents should be able to use this structure to display the cryptographically protected headers to the user, indicating their protection.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Hackers target internet address bug to disrupt sites - BBC News

Hackers target internet address bug to disrupt sites - BBC News | Hacking Wisdom | Scoop.it
Hackers are exploiting a serious flaw in the internet's architecture, according to a security firm.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

0-day bug in fully patched OS X comes under active exploit to bypass password protection

0-day bug in fully patched OS X comes under active exploit to bypass password protection | Hacking Wisdom | Scoop.it
Privilege-escalation bug lets attackers infect Macs sans password.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

VUPEN Launches New Zero-Day Acquisition Firm Zerodium

VUPEN Launches New Zero-Day Acquisition Firm Zerodium | Hacking Wisdom | Scoop.it

French security firm VUPEN has started a new zero day exploit purchase and sale program called Zerodium.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Experts Found a Unicorn in the Heart of Android

Experts Found a Unicorn in the Heart of Android | Hacking Wisdom | Scoop.it
UPDATE: Zimperium’s Mobile Threat Protection customers are safe from this threat,  even without updating the device to the latest Android version. Zimperium offers mobile forensic services to its customers. Companies that have reasons to believe that they are under active Stagefright attacks – should contact us ASAP at stagefright-urgent@zimperium.com Zimperium Research Labs (zLABS) will release … Read More
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Windows ClientCopyImage Win32k Exploit - Exploits Database

Windows ClientCopyImage Win32k Exploit. CVE-2015-1701. Local exploit for windows platform
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Microsoft Windows OpenType Font (OTF) CMAP code execution (OTF_Windows_Cmap_Table_Corruption)

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Project Zero: One Perfect Bug: Exploiting Type Confusion in Flash

Project Zero: One Perfect Bug: Exploiting Type Confusion in Flash | Hacking Wisdom | Scoop.it
Hacking Wisdom's insight:

For some attackers, it is important that an exploit be extremely reliable. That is to say, the exploit should consistently lead to code execution when it is run on a system with a known platform and Flash version. One way to create such an exploit is to use an especially high-quality bug. This post describes the exploitation of one such bug, and the factors that make it especially good for reliable exploitation.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Firefox < 39.03 - pdf.js Same Origin Policy Exploit - Exploits Database

Firefox < 39.03 - pdf.js Same Origin Policy Exploit. CVE-2015-4495. Local exploits for multiple platform

Hacking Wisdom's insight:

Based upon https://github.com/vincd/CVE-2015-4495

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

How to stop a leak - the WebRTC notifier - webrtcHacks

Chad Hart and Philipp Hancke discuss the how & why WebRTC can expose a local IP address without a user's consent and present a Chrome Extension to fix that
Hacking Wisdom's insight:

The “IP Address Leakage” topic has turned into a public relations issue for WebRTC. It is a fact that the WebRTC API’s can be used to share one’s private IP address(es) without any user consent today. Nefarious websites could potentially use this information to fingerprint individuals who do not want to be tracked. Why is this an issue? Can this be stopped? Can I tell when someone is trying to use WebRTC without my knowledge? We try to cover those questions below along with a walkthrough of a Chrome extension that you can install or modify for yourself that provides a notification if WebRTC is being used without your knowledge.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

New virus created that can completely wreck Apple computers

New virus created that can completely wreck Apple computers | Hacking Wisdom | Scoop.it

Two security consultants have created a new computer worm, the Thunderstrike 2, that attacks the core hardware of a Mac computer once unleashed. The worm was designed to expose vulnerabilities in the once-assumed airtight security of Apple products.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Large Malvertising Campaign Takes on Yahoo!

Large Malvertising Campaign Takes on Yahoo! | Hacking Wisdom | Scoop.it
The latest malvertising wave exposes millions of visitors to Yahoo! sites.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

MtGox bitcoin chief Mark Karpeles arrested in Japan - BBC News

MtGox bitcoin chief Mark Karpeles arrested in Japan - BBC News | Hacking Wisdom | Scoop.it
The founder of MtGox - once the world's biggest bitcoin exchange - is arrested by Japanese police investigating losses of nearly $400m.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Pedofilia, sigilli a "mercato illecito" sul deep web: polizia sequestra bitcoin - Tgcom24

Pedofilia, sigilli a "mercato illecito" sul deep web: polizia sequestra bitcoin  - Tgcom24 | Hacking Wisdom | Scoop.it
Il sequestro di cryptomoneta, prima volta che viene effettuato in Italia, è arrivato in seguito a decine di perquisizioni informatiche
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Android: How to Protect from StageFright Vulnerability

Click here to edit the title

Hacking Wisdom's insight:

Cert Advisory at http://www.kb.cert.org/vuls/id/924951

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Security industry failing to keep pace with hacker innovation, Cisco warns

Security industry failing to keep pace with hacker innovation, Cisco warns | Hacking Wisdom | Scoop.it
Exploit kits and ransomware being developed at an alarming rate
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Researchers prove HTML5 can be used to hide malware

Researchers prove HTML5 can be used to hide malware | Hacking Wisdom | Scoop.it

A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow mal...

Hacking Wisdom's insight:

A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute successful drive-by download attacks.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110) | Rapid7

Hacking Wisdom's insight:

Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution

more...
No comment yet.