cyberhacker.org
Computer Security News: Samsung Galaxy SIII and Note II Can Be Easily Hacked
http://www.cyberhacker.org/2012/12/samsung-galaxy-siii-and-note-ii-can-be.html
Tuesday, December 18, 2012. Samsung Galaxy SIII and Note II Can Be Easily Hacked. The exploit appears to work on any device running a Exynos 4210 or 4412 processor. We have previously seen other vulnerabilities in Samsung Galaxy devices. This one, in particular, is very dangerous given the amount of malware-infected apps in the Google Play store. Subscribe to: Post Comments (Atom). Forensics and Cybersecurity Links. Computer Forensics and Cyber Security Consultants. Computer Forensics Expert in Virginia.
cyberhacker.org
Computer Security News: December 2012
http://www.cyberhacker.org/2012_12_01_archive.html
Tuesday, December 18, 2012. Samsung Galaxy SIII and Note II Can Be Easily Hacked. The exploit appears to work on any device running a Exynos 4210 or 4412 processor. We have previously seen other vulnerabilities in Samsung Galaxy devices. This one, in particular, is very dangerous given the amount of malware-infected apps in the Google Play store. Links to this post. SMS Trojan For Macs: Apple Users - You Are Not Immune. Links to this post. Subscribe to: Posts (Atom). Forensics and Cybersecurity Links.
cyberhacker.org
Computer Security News: Samsung Galaxy Smartphones Vulnerable to Malicious Wiping
http://www.cyberhacker.org/2012/09/samsung-galaxy-smartphones-vulnerable.html
Wednesday, September 26, 2012. Samsung Galaxy Smartphones Vulnerable to Malicious Wiping. Visit our site to learn about computer forensics. We are also experts in forensic analysis of mobile devices. Location: 8527 Mayland Dr, Henrico, VA 23294, USA. Subscribe to: Post Comments (Atom). Forensics and Cybersecurity Links. Computer Forensics and Cyber Security Consultants. Computer Forensics Expert in Virginia. Internet and Cyber Law Attorneys. Samsung Galaxy Smartphones Vulnerable to Malicious.
cyberhacker.org
Computer Security News: March 2013
http://www.cyberhacker.org/2013_03_01_archive.html
Tuesday, March 5, 2013. More Java Zero-Day Exploits. Has a post dedicated to CVE-2013-0422. Links to this post. Subscribe to: Posts (Atom). Forensics and Cybersecurity Links. Computer Forensics and Cyber Security Consultants. Computer Forensics Expert in Virginia. Internet and Cyber Law Attorneys. More Java Zero-Day Exploits. View my complete profile. Awesome Inc. template. Powered by Blogger.
cyberhacker.org
Computer Security News: October 2012
http://www.cyberhacker.org/2012_10_01_archive.html
Wednesday, October 31, 2012. VA Computers Still Unencrypted After Six Years. Friday, October 19, 2012. Pacemakers Can Be Hacked. Shocking (literally). Jack was able to send a series of 830-volt shocks (enough to cause death) to a pacemaker and use a "secret function" to activate other pacemakers within a 30-foot radius. With the function activated, the devices would give up their serial numbers, allowing hackers to upload malware that could spread like a virus to other pacemakers. Jack said that ...The w...
cyberhacker.org
Computer Security News: Twenty Five Percent of Android Apps Present Security Risks
http://www.cyberhacker.org/2012/11/twenty-five-percent-of-android-apps.html
Saturday, November 3, 2012. Twenty Five Percent of Android Apps Present Security Risks. Do people really pay attention to the laundry list of permissions presented to the user when installing Android apps? Why would a wallpaper or a board game need access to a user's GPS data or call history? 42 percent of applications access GPS location data, and these include wallpapers, games and utilities. 31 percent access phone calls or phone numbers. 26 percent access personal data, such as contacts and email.
cyberhacker.org
Computer Security News: November 2013
http://www.cyberhacker.org/2013_11_01_archive.html
Saturday, November 30, 2013. Prevalent Malware: November 2013 Edition. Sourcefire has compiled the list of this month’s most prevalent malware files. The list provides the hash checkup values for each file as well as a link to the entry on virustotal. To assist computer forensics analysts. Or incident responders, the list provides the file name and the fake publisher claimed by the malware. Some notable examples of the identified malware files include:. Https:/ www.virustotal.com/en/. Links to this post.
cyberhacker.org
Computer Security News: December 2013
http://www.cyberhacker.org/2013_12_01_archive.html
Friday, December 6, 2013. Still No Clues In The Million Dollar Bitcoin Heist. Links to this post. Tuesday, December 3, 2013. Government Must Improve its Cybersecurity, Technology Council Report Says. You may read a complete copy of the report at: http:/ www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast cybersecurity nov-2013.pdf. Links to this post. Subscribe to: Posts (Atom). Forensics and Cybersecurity Links. Computer Forensics and Cyber Security Consultants. View my complete profile.
SOCIAL ENGAGEMENT