18 Feb 2014

Create iPhone Rootkits Like You’re the NSA

In a recently leaked document it was revealed that the NSA had a project called “Dropout Jeep”. The purpose of the program was to install a rootkit on an iPhone that would allow calls and other information to be intercepted, as well as enable the device as a microphone, track

0
31 Dec 2013

4.6 Million Snapchat Users’ Phone Numbers and Usernames Leaked Online

In a brazen move, a group has utilized an exploit for a recently patched Snapchat vulnerability, and has released a database containing usernames and phone numbers of 4.6 million Snapchat users. The group removed the last two digits of the phone numbers, however is claiming to make the full version

0
11 Nov 2013

IE Zero-Day Ephemeral Hydra

A new IE zero-day exploit has been discovered by researchers at FireEye. This exploit is interesting because of the unknowns: Without code to make the exploit persistent, we don’t know what the attacker is after.

0
27 Jun 2013

Analysis of Korean War Anniversary Cyber Attack and Malware

In both North Korea and South Korea, several websites were defaced and brought down via a DDoS attack on the anniversary of the start of the Korean War. The Red Alert (R3d4l3rt) team in South Korea have provided an in depth analysis of the vulnerabilities and methods used to access

0