Exploits

27 posts

Category: Exploits

Intel brief on Russian hacking
Those darned Russians Read it. The DNI report on the impact of Putin and his band of merry hackers was released today and it is a very interesting read. The declassified 25 page document touches on many aspects : misinformation, fake-news, internet trolls, foreign relations and the many failures of the current administration to secure the country against these types of ...

DNI report on impact of Russian efforts to impact US elections

Echo dot Alexa helps 6 year old order 4lbs of cookies and $170 doll house | AI
Amazon Strikes Again! Hey Alexa…gimmie some cookies! On the heels of a different kid-hacker, (6 year old girl from Little Rock, Arkansas), who used her moms biometric credentials to order $250 in Pokémon gear using an iPhone, Dallas Texan Megan Neitzel tells Fox News that her 6 year old daughter bought a $170 doll house and 4 pounds of….cookies, using their Echo Dot ...

Echo dot Alexa helps 6 year old order 4lbs of cookies and $170 doll house | AI

Apple is doomed
Large Contact file causes iMessage crash in iOS Yes, it works. No, it’s not detrimental. It is annoying…and no…I won’t be replicating how to do it here. I will, however, embed the video created by the exploit – and fix – finder, Vincendes3: Mitigation Don’t accept contact files from people you don’t know…and don’t have known friends who like to ...

iMessage hack crashes app | Exploits

We finally get an explanation on Control Center|iOS 10 beta 4
beta is betta 2 of the toughest hurdles people are going to need to get over are the new iOS 10 lock screen and control center. iOS 10 features a 2 panel control center and a press to unlock lock screen. The card-style presentations are prevalent throughout iOS 10, and the Notification Center is no different; system controls First up: ...

We finally get an explanation on Control Center|iOS 10 beta 4

Vetting the 9.3.3 Jailbreak
Pwnin', pwnin'...pwnin' ...
/ / Exploits, Jailbreak, Gallery

Vetting the 9.3.3 Jailbreak

Can an iPhone 6 be hacked through a WiFi network you are using?
Can an iPhone 6 be hacked through a WiFi network you are using?? Can an iPhone 6 be hacked through a WiFi network you are using? Let’s say your using a protected wifi or unprotected wifi. Someone that wants to see your stuff on the phone goes through that wifi and goes through your phone because your using that wifi ...

Can an iPhone 6 be hacked through a WiFi network you are using?

key flag
The gag on the method isn’t even the most interesting question, although it is baffling why a judge would give the code and the method of the exploit to the criminal, but not allow the developers who coded the browser to fix the vulnerability. I want to know why the FBI burned an exploit…a valuable exploit… ...

FBI pwns TOR|How they screwed up

iOS 9.0.1 lockscreen vulnerability
Lockscreen security is important, but so is not propagating b.s ...

iOS 9.0.1 lockscreen vulnerability

Apple reaches out to Developers about Xcode  after exploit
After compromised apps were detected in the AppStore, an analysis yielded the applications were made using a hacked version of the Xcode IDE. Apple is reaching out to developers to make sure they know where to get it. It’s almost ridiculous these had to have been sent: Palo Alto Research adds granularity: More Details on the XcodeGhost Malware and Affected ...

Apple reaches out to Developers about Xcode  after exploit

Loading...