Tags » Exploit

How anyone can hack your Instagram account

Stevie Graham, a security researcher who reported an authentication flaw in Instagram’s iOS software a few days ago, was denied a bug bounty by Facebook. 500 more words


Solving fusion level 13


Fusion’s level 13 is a Formatstring vulnerable application. The website doesn’t provide us any source code or extra info.

When playing with the application its easy to find the vulnerability, we can see that the ‘name’,’password’,’e-mail’ are vulnerable. 1,051 more words


The Future

Carousel 2014; Collage and Colored Pencil on Paper. 
h11 x w8.5 in.

The future, once bright and lurching has turned into a deranged mistress. She ‘uncovered‘ my sometimes wife and is planning a murderous end to my tramping. 32 more words


Critical infrastructure at risk from SCADA vulnerabilities

Is critical infrastructure any more secure than it was a year ago, or five years ago? Well, according to three different reports from experts, it doesn’t seem like it. 945 more words

Mind the Gap – Mind your Android

Android holds approximately 80% of the global mobile market today. Due to the popularity of the Android operating system for mobile phones, it serves as a more attractive target for hackers and cyber criminals than iOS mobile phones. 411 more words

Cyber Intelligence

Bloomberg Businessweek Succumbs to the Exploitation of Women

Bloomberg Businessweek, one of the nation’s trusted and respectable higher-level news sources on topics such as the economy, the stock market, companies, industries and governments, has just reduced itself to cleavage.


Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises

Firefox 31 is out.

So is its updated conservative older brother, the Extended Support Release, now at 24.7.

And Firefox’s email-oriented cousin Thunderbird gets updated, too. 619 more words