Jump to content

Search the Community

Showing results for tags 'backdoors'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 7 results

  1. Criminals are distributing fake VPN installers with backdoors built in Another reason to always download VPN clients directly from a provider's website (Image credit: Shutterstock) The recent shift to remote working has led users to turn to VPN services to stay secure and protect their privacy online but new research from Trend Micro has revealed that cybercriminals are now distributing fake VPN installers with backdoors. The firm's researchers discovered VPN installers for Windscribe being distributed online that also i
  2. Telecom kit maker points finger in the general direction of Middle Kingdom's complicated supply chain Hardware video encoders from multiple suppliers contain several critical security bugs that allow a remote unauthenticated miscreant to run arbitrary code on the equipment. In a disclosure published this week, Alexei Kojenov, lead product security engineer at Salesforce, outlined a series of flaws affecting IPTV/H.264/H.265 video encoders powered by the hi3520d chipset from Huawei's HiSilicon subsidiary. The security holes are present in software, wh
  3. Chinese hacking group backdoors products from three Asian gaming companies ESET suspects that tens or hundreds of thousands of users have been infected already. Image: Screengrab of Infestation homepage A notorious Chinese cyber-espionage outfit known as the Winnti Group has breached the networks of two game makers and a gaming platform in Asia to include a backdoor trojan within their products. Two of the compromised products no lo
  4. Attackers Hide Backdoors and Cryptominers in WAV Audio Files Attackers behind a new malicious campaign are using WAV audio files to hide and drop backdoors and Monero cryptominers on their targets' systems as BlackBerry Cylance threat researchers discovered. While various other malware peddlers were previously observed injecting payloads in JPEG or PNG image files [1, 2, 3] with the help of steganography, a well-known technique used to evade an
  5. Microsoft CEO believes backdoors aren't the answer Satya Nadella chooses privacy and public safety over backdoors (Image credit: Mike Moore) As Apple is once again in the midst of another fight over encryption following a recent shooting at Pensacola naval base, Microsoft CEO Satya Nadella weighed in with his thoughts on the encryption question. During a recent meeting with reporters, Nadella reiterated Microsoft's opposition to encryption backdoors while also expressing support for future legal and technical solutions,
  6. A bipartisan group of House lawmakers have introduced legislation that would block the federal government from requiring technology companies to design devices with so-called back doors to allow law enforcement to access them. The bill represents the latest effort by lawmakers in Congress to wade into the battle between federal law enforcement officials and tech companies over encryption, which reached a boiling point in 2015 as the FBI tussled with Apple over a locked iPhone linked to the San Bernardino terror attack case. Top FBI and Justice Department officials have repe
  7. Tor is still DHE 1024 (NSA crackable) After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys. Assuming no "breakthroughs", the NSA can spend $1 billion on custom chips that can break such a key in a few hours. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips. The problem with Tor is that it still uses these 1024 bit keys for much of its crypto, particularly because most people are still using older versions o
×
×
  • Create New...