A few months ago, an exploit of Minecraft 1.8 was released to the public. This exploit involved forcing the Minecraft Client to download a malicious file from a 3rd-Party website or server. Once the severity of the exploit was seen by Mojang (The creators and owners of Minecraft), the exploit was quickly fixed in the … Continue reading The Security Risk of Minecraft 1.8
WordPress was comprimised by the Nuetrino Exploit Kit. This exploit kit installs backdoors on WordPress sites running older versions of the content management system (4.2 and older). It then redirects the victim through a series of iFrames to a landing page hosting a Flash exploit. The exploit targets users running Internet Explorer and the victims … Continue reading WordPress was comprimised!
So I've noticed that a lot of us do not keep our credentials (Usernames, passwords, pins and others) safe from attackers and people who use remote access. In fact, a few days ago, I discovered that my brother keeps some of his passwords and usernames in an un-encrypted text file. Which, if you ask me, … Continue reading How safe do you keep your credentials?
Ok, so I saw this on twitter and I decided to take a look at it: https://twitter.com/troyhunt/status/633011868596989952 The response from EnglishNationalOpera was amazing, I couldn't believe it: https://twitter.com/E_N_O/status/632915065130381312 Now, you are probably thinking "What's going on?" - It's simple, EnglishNationalOpera does not understand the risks of having a https logon form being loaded over http. … Continue reading XSS: Loading a https logon form over http
This blog page will be used by me to talk about recent news and concerns in the security world. If you dont know, I am a cyber-security researcher and enthusiast, and I decided that this place would be the best place for me to talk to the public about recent security issues. By iFuzion77 - … Continue reading About this blog