Dismiss this notice
Avast Premium Security Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9410

Dismiss this notice
ExpressVPN Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9405

Dismiss this notice
Master PDF Editor Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9407

Dismiss this notice
O&O Software Christmas Blowout 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9409

Dismiss this notice
Bandicam Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9404

Dismiss this notice
HitmanPro.Alert Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9406

Dismiss this notice
GFYI [Official] Ashampoo® Christmas Blowout 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9408

Dismiss this notice
Emsisoft Anti-Malware Home Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9412

Dismiss this notice
Macrium Reflect Home Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9415

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&C
#1
Quote:Researchers have uncovered some potentially serious SQLite vulnerabilities and they have demonstrated their findings by hacking an iPhone and a command and control (C&C) server used by malware.
 
SQLite is a small, fast and full-featured database management system contained in a C library. SQLite is widely used and it can be found by default in many mobile and desktop operating systems, including Windows 10, macOS, iOS, Android, BlackBerry 10 OS, Oracle Solaris 10, FreeBSD, and LG webOS. It’s also used by popular web browsers such as Chrome, Firefox and Safari.
 
Researchers at cybersecurity firm Check Point started investigating SQLite after noticing that some pieces of malware steal passwords from compromised machines by collecting the SQLite database files used by the targeted apps to store passwords. The database files are uploaded to the C&C server and parsed using PHP so that their content can be transferred to a central database where the attackers store all collected passwords.
 
Check Point’s investigation revealed the existence of several vulnerabilities that allow an attacker to execute arbitrary code by getting an application using SQLite to query a specially crafted database.

Read more here: https://www.securityweek.com/sqlite-vuln...malware-cc
[-] The following 1 user Likes silversurfer's post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
GFYI [Official] FastPCTools Fast Video ...
"What is your...divinenews — 20:36
Funny pictures
Herran — 16:28
Vivaldi Browser Updates
Vivaldi Stable 2.1...silversurfer — 13:27
Opera Browser Updates
Opera Stable 66.0.3...silversurfer — 13:25
Google Chrome Updates
Google Chrome 79.0....silversurfer — 13:22

[-]
Birthdays
Today's Birthdays
avatar (44)Qlaude2Sap
Upcoming Birthdays
avatar (44)theoldevext
avatar (39)algratCep
avatar (45)Josepharelf
avatar (34)kholukrefar
avatar (43)Lauraimike
avatar (45)WilsonWag
avatar (43)StevenPiole
avatar (34)zetssToomy
avatar (41)GornOr
avatar (44)Jamesmog
avatar (32)opeqyrav
avatar (32)ivanoFloom
avatar (35)uxegihor

[-]
Online Staff
harlan4096's profile harlan4096
Administrator

>