Noobs can pwn world’s most popular BIOSes in two minutes

Friday, March 20th, 2015

Millions of flawed BIOSes can be infected using simple two-minute attacks that don't require technical skills and require only access to a PC to execute. Basic Input/Output Systems (BIOS) have been the target of much hacking research in recent years since low-level p0wnage can grant attackers the highest privileges, persistence and ...

Killer USB Drive is Designed to Fry Laptops

Thursday, March 12th, 2015

[Dark Purple] recently heard a story about how someone stole a flash drive from a passenger on the subway. The thief plugged the flash drive into his computer and discovered that instead of containing any valuable data, it completely fried his computer. The fake flash drive apparently contained circuitry designed ...

Cutting-edge hack gives super user status by exploiting DRAM weakness

Monday, March 9th, 2015

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux. The technique, outlined in a blog post published Monday by Google's Project Zero ...

Spam Uses Default Passwords to Hack Routers

Saturday, February 28th, 2015

In case you needed yet another reason to change the default username and password on your wired or wireless Internet router: Phishers are sending out links that, when clicked, quietly alter the settings on vulnerable routers to harvest online banking credentials and other sensitive data from victims. Sunnyvale, Calif. based security firm Proofpoint said it recently ...

Malware Is Still Spying On You Even When Your Mobile Is Off

Friday, February 20th, 2015

Most of us have seen Hollywood movies where hackers trace and spy on mobile devices even though they are switched off. Like most things in spy movies, we disregard it as fiction. However, recent malware discovered by the AVG mobile security team may change this preconception. This malware hijacks the shutting down ...