Quantcast
Channel: MondoUnix » BACKDOOR
Browsing latest articles
Browse All 6 View Live

Exploit : RuggedCom Devices Backdoor Access

Title: Undocumented Backdoor Access to RuggedCom Devices Author: jc Organization: JC CREW Date: April 23, 2012 CVE: CVE-2012-1803 Background: RuggedCom is one of a handful of networking vendors who...

View Article



WordPress WPtouch Mobile 3.4.5 Shell Upload

Wordpress WPtouch Mobile Plugin File Upload Vulnerability   =================================     ==================== ______ ___/ / / / / / / /___ ____ ___/__ / / ____ ____ _______ ____ ___/ / : / /...

View Article

Image may be NSFW.
Clik here to view.

Senator: Backdoor for the Feds is a backdoor for hackers

A US Senator is urging Congress to pass laws forbidding Uncle Sam's spies from forcing software and hardware makers to build backdoors. In an op-ed posted in the LA Times, Sen. Ron Wyden (D-OR) said...

View Article

Image may be NSFW.
Clik here to view.

Latest version of OS X closes backdoor bug that gives root

For at least four years, a bug in Apple's OS X gave untrusted users—and possibly remote hackers with only limited control of their target—unfettered "root" privileges over Macs. The vulnerability is...

View Article

Image may be NSFW.
Clik here to view.

Chinese hacker group has been spying on governments for a decade, says FireEye

A CHINESE CYBER THREAT GROUP is said to have one of the longest ever cyber espionage operation histories, having spied on governments for over a decade. The APT 30 hacker group was uncovered by...

View Article


Image may be NSFW.
Clik here to view.

North Korea exploits 0-day in Seoul’s favourite word processor

FireEye researchers Genwei Jiang and Josiah Kimble say attackers from North Korea exploited a zero day vulnerability in a word processor popular with the South Korea's government. The attackers went...

View Article
Browsing latest articles
Browse All 6 View Live


Latest Images