Skip to main content

HITBGSEC

HITB GSEC Singapore - Unveiling the Latest Trends and Threats in the Cyber Security Landscape

posted onAugust 28, 2019
by l33tdawg
Credit: Yahoo! Finance

Hack In The Box (HITB), known for its cutting-edge technical talks and trainings in computer security, is holding its 5th annual GSEC security conference in Singapore. Taking place at the InterContinental from August 26 to 30, HITB's GSEC security conference features a unique audience-voted line up of talks and a wide range of hacking games, exhibits and challenges, including its ever-popular HITB Capture The Flag (CTF) competition. The event precedes HITB+CyberWeek taking place in Abu Dhabi in October – set to be HITB's largest event this year.

Apple Keeps Malware Info from Antivirus Firms: Researcher

posted onJanuary 3, 2019
by l33tdawg
Credit: Laptop Mag

Patrick Wardle, about whose discoveries we've written many times on Tom's Guide, last month analyzed a new strain of Mac malware called Windshift. He noticed that Apple had revoked the digital certificate that let the malware install on Macs. That's good.

Engineer fined for blogging exactly how to hack a hotel's Wi-Fi

posted onSeptember 28, 2018
by l33tdawg
Credit: Flickr

It's one thing to report website vulnerabilities before they're used maliciously. It's another to blog about a vulnerability online.

Singapore authorities fined Zheng Dutao, an engineer at Chinese internet giant Tencent, S$5,000 (about $3,660) this week after discovering he hacked into a hotel's Wi-Fi system and shared sensitive information on his blog, ZDNet reported Tuesday.

Security researcher highlights macOS remote exploit w/ custom URL schemes

posted onSeptember 4, 2018
by l33tdawg
Credit: 9 to 5 Mac

Security researchers look at how macOS users can be remotely targeted using document handlers and custom URL schemes – which is behind the “Do you want to allow” popup seen in the above screenshot.

Patrick Wardle explains how a custom APT abuses URL schemes to remotely infect macOS targets

Hackers Are Exposing An Apple Mac Weakness In Middle East Espionage

posted onSeptember 3, 2018
by l33tdawg
Credit: Forbes

Apple Macs are rarely the target of digital espionage. But in recent years, a mysterious hacker crew called WindShift has targeted specific individuals working in government departments and critical infrastructure across the Middle East. And they’re exploiting weaknesses believed to affect all Apple Mac models.

Hacker Unlocks 'God Mode' and Shares the 'Key'

posted onAugust 14, 2018
by l33tdawg
Credit: HITBGSEC

L33tdawg: Christopher will also be at #HITBGSEC Singapore at the end of August.

When a room filled with hundreds of security professionals erupts into applause, it's notable. When that happens less than five minutes into a presentation, it's remarkable. But that's what transpired when security researcher Christopher Domas last week showed a room at Black Hat USA how to break the so-called ring-privilege model of modern CPU security.

Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA

posted onAugust 29, 2017
by l33tdawg
Credit:

Researchers from Positive Technologies — a provider of enterprise security solutions — have found a way to disable the Intel Management Engine (ME), a much-hated component of Intel CPUs.

Intel ME is a separate processor embedded with Intel CPUs that runs its own operating system complete with processes, threads, memory manager, hardware bus driver, file system, and many other components.

SAP point-of-sale systems were totally hackable with $25 kit

posted onAugust 29, 2017
by l33tdawg

Point-of-Sale systems from SAP had a vulnerability that allowed them to be hacked using a $25 Raspberry Pi or similar device, according to research unveiled at the Hack in the Box conference in Singapore last week.

Critical vulnerabilities in SAP's POS – since resolved – created a means for hackers not only to steal customers' card data but to gain unfettered control over the server, enabling them to change prices of goods with the help of a simple device, according to ERPScan.

Researcher Releases Fully Working Exploit Code for iOS Kernel Vulnerability

posted onAugust 27, 2017
by l33tdawg

Adam Donenfeld, a researcher with mobile security firm Zimperium, has published today proof-of-concept code for zIVA — a kernel exploit that affects iOS 10.3.1 and previous versions.

The zIVA exploit code allows an attacker to gain arbitrary RW (Read Write) and root access. Apple has addressed the eight vulnerabilities at the heart of this exploit package in a security patch it released in May. One affects the IOSurface kernel extension and seven others affect the AppleAVE Driver kernel extension.