Here is the list of Routers that are vulnerable to CherryBlossom

3Com: 3CRWE454A72, 3CRWX120695A, 3CRWX275075A, 3CRTRV10075, 3CRWE41196, 3CRWE454G72, 3CRWE53172, 3CRWE554G72T, 3CRWE554G72TU, 3CRWE675075, 3CRWE725075A-US, 3CRWE754G72-A, 3CRWE754G72-B, 3CRWE825075A-US, 3CRWE875075A-US, 3CRWE91096A, 3CRWE91096A, 3CRWE920G73-US, 3CRWEASY96A, 3CRWEASY96A, 3CRWEASYG73-U, 3CRWX440095A Accton: WA3101, WA4101, WA5101, WA5201, WA6101, WA6102, WA6102X Aironet/Cisco: Aironet 1310 Outdoor Access Point /Bridge, Aironet 350 Series Wireless Bridge, 1300 Series Outdoor Access Point/Bridge, Aironet 1200 Series a/b/g Access Point, Aironet […]

Here is the list of Routers that are vulnerable to CherryBlossom Read More »

Penetration Tester

Req #: 170063143_1 Location: Columbus, OH, US Job Category: Technology JPMorgan Chase & Co. (NYSE: JPM) is a leading global financial services firm with assets of $2.6 trillion and operations worldwide. The firm is a leader in investment banking, financial services for consumers and small business, commercial banking, financial transaction processing, and asset management. A

Penetration Tester Read More »

New Phishing Tactic Targeting Facebook Users Relies on Padding URLs with Hyphens

Security researchers from PhishLabs have come across a new phishing trend that’s targeting mobile device owners exclusively, with “the highest proportion of attacks” aimed at Facebook users. This new tactic relies on the fact that mobile browsers have very narrow URL address bars, which prevents users from viewing the entire contents of a link. Phishers

New Phishing Tactic Targeting Facebook Users Relies on Padding URLs with Hyphens Read More »

The Nigerian Spammers From the 90s Have Moved on to Keyloggers and RATs

Each day, countless of security researchers are fighting the good fight in an effort to help companies remove malware from infected computers and servers. These researchers have to go through numerous hoops to get their message across to the proper person inside companies or government organizations who are allowed or can remove these infections from

The Nigerian Spammers From the 90s Have Moved on to Keyloggers and RATs Read More »

The CIA can turn your Router’s firmware into a surveillance tool

According to new Posts published by WikiLeaks, the CIA has been developing and maintaining a host of tools to do just that. This morning, the organization published new documents describing a program called Cherry Blossom, which uses an altered version of a given router’s firmware to turn it into a surveillance tool. Once in point,

The CIA can turn your Router’s firmware into a surveillance tool Read More »

Be careful! your E-Cigarette can be used to hack your computer

Ross Bevington (a security researcher) found that an E-cigarette can hack a computer by fooling it to think that it was a keyboard. It was also able to hack the computer by interfering with its network traffic. For those unfamiliar, an electronic cigarette or e-cigarette is a handheld electronic device that creates an aerosol by

Be careful! your E-Cigarette can be used to hack your computer Read More »

Blaming the Internet For Terrorism Misses The Point

BRITISH PRIME MINISTER Theresa May has found something to blame for Saturday night’s terror attack in London: the internet. May, responding to the attack by three young men who killed seven people and injured scores more, called for an end to the “safe spaces” that the internet provides, and for measures to “regulate cyberspace.” Read

Blaming the Internet For Terrorism Misses The Point Read More »