Dismiss this notice
Thor Foresight Home Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8636

Dismiss this notice
Avast Premier Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8637

Dismiss this notice
Kryptel Standard Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8635

Dismiss this notice
Driver Easy Professional Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8634

Dismiss this notice
O&O Software Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8633

Dismiss this notice
Ashampoo WinOptimizer 17 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8626

Dismiss this notice
AIDA64 Extreme Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8625

Dismiss this notice
Ashampoo Movie Studio Pro 3 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8624

Dismiss this notice
AirVPN Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8623

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&C
#1
Quote:Researchers have uncovered some potentially serious SQLite vulnerabilities and they have demonstrated their findings by hacking an iPhone and a command and control (C&C) server used by malware.
 
SQLite is a small, fast and full-featured database management system contained in a C library. SQLite is widely used and it can be found by default in many mobile and desktop operating systems, including Windows 10, macOS, iOS, Android, BlackBerry 10 OS, Oracle Solaris 10, FreeBSD, and LG webOS. It’s also used by popular web browsers such as Chrome, Firefox and Safari.
 
Researchers at cybersecurity firm Check Point started investigating SQLite after noticing that some pieces of malware steal passwords from compromised machines by collecting the SQLite database files used by the targeted apps to store passwords. The database files are uploaded to the C&C server and parsed using PHP so that their content can be transferred to a central database where the attackers store all collected passwords.
 
Check Point’s investigation revealed the existence of several vulnerabilities that allow an attacker to execute arbitrary code by getting an application using SQLite to query a specially crafted database.

Read more here: https://www.securityweek.com/sqlite-vuln...malware-cc
[-] The following 1 user Likes silversurfer's post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
What is the Principle of Least Privilege...
And why failing...harlan4096 — 09:12
Samsung 970 EVO Plus SSD Review: More La...
Our Verdict ...harlan4096 — 09:07
GFYI [Official] Ashampoo Movie Studio P...
Thanks a lot for the...Raur — 09:05
AMD Confirms Ryzen 5 3500U After Appeari...
"We are of...harlan4096 — 09:03
Funny pictures
Herran — 08:53

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (34)idilamoz
avatar (51)Stefanos

[-]
Online Staff
There are no staff members currently online.

>