web analytics

What is a Zero-Day?

April 12, 2017 by Scott Wilson                                           You have probably heard the term zero-day or zero-hour malware, but what exactly does it mean?   It’s simple: it just means the malware is using a software vulnerability for which there is currently no available defense or fix. The vulnerability allows the… Continue reading What is a Zero-Day?

SAP closes critical vulnerability affecting TREX

Help Net Security April 12, 2017   SAP closed a critical vulnerability for an issue that was exposed for almost two years. The vulnerability (SAP Security Note 2419592) affects TREX, a SAP NetWeaver standalone search engine, which is deployed in over a dozen SAP products including SAP HANA.                                            … Continue reading SAP closes critical vulnerability affecting TREX

Mole Ransomware Distributed Through Fake online Word Docs

April 12th 2017 By Lawrence Abrams   A new ransomware called Mole was found by security researcher Brad Duncan while he was analyzing a new SPAM campaign. After examining this sample, I feel that this is probably another variant of the CryptoMix family as it has many similarities to the Revenge and CryptoShield variants.     As a note, in this article… Continue reading Mole Ransomware Distributed Through Fake online Word Docs

Let's All Ask A Few More Questions Before Claiming Russia Hacked Brexit

April 12, 2017  By Jim Waterson   Many news outlets are covering a report by MPs into how last summer’s EU referendum was conducted. The report has resulted in some pretty shocking headlines about potential foreign interference in the vote.   Did a foreign government contrive to take down the UK’s voter registration website? It… Continue reading Let's All Ask A Few More Questions Before Claiming Russia Hacked Brexit

iPhone 3GS untethered bootrom exploit released

By Joaquim Barbosa, Apr 11, 2017                                                  Today saw the release of a new bootrom exploit for the iPhone 3GS, an unpatchable vulnerability which gives jailbreakers total control of this device forever.   Although the iPhone 3GS is now very much a legacy device and few users will… Continue reading iPhone 3GS untethered bootrom exploit released

How fraudsters stole millions with the help of a legitimate online tool

Zeljka Zorz – April 11, 2017   Identity thieves have managed to steal $30 million from the US Internal Revenue Service by taking advantage of an online tool designed to help students fill out financial aid applications, IRS Commissioner John Koskinen told the Senate Finance Committee on Thursday.                                          How did it happen?… Continue reading How fraudsters stole millions with the help of a legitimate online tool

Mozilla Firefox 52.0.2 Final

Mozilla Firefox 52.0.2 Final https://www.mozilla.org/en-US/firefox/52.0.2/releasenotes/   en-USx86https://download.mozilla.org/?product=firefox-52.0.2-SSL&os=win&lang=en-USx64https://download.mozilla.org/?product=firefox-52.0.2-SSL&os=win64&lang=en-US   Download Page | All Languages and OS https://www.mozilla.org/en-US/firefox/all/ Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Google Chrome 57.0.2987.133 Stable

Google Chrome 57.0.2987.133 Stable https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html   x86 http://redirector.gvt1.com/edgedl/release2/AMjFn8OXY1O3/57.0.2987.133_chrome_installer.exe   Standalonehttp://www.google.com/chrome/eula.html?standalone=1http://dl.google.com/edgedl/chrome/install/GoogleChromeStandaloneEnterprise.msi   x64 http://redirector.gvt1.com/edgedl/release2/VGvCfKkHWmI/57.0.2987.133_chrome_installer.exe   Standalonehttp://www.google.com/chrome/eula.html?standalone=1&platform=win64http://dl.google.com/edgedl/chrome/install/GoogleChromeStandaloneEnterprise64.msi Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Hackers Guess PINs from the Way You Tilt Your Smartphone

11th April 2017 By Tara Seals   When it comes to guessing keystrokes from user behavior, telltale signs can say volumes. Researchers at Newcastle University have managed to guess a four-digit PIN on a smartphone using information about the way the phone is tilted.   And it’s not a lucky guess, either: They correctly identified… Continue reading Hackers Guess PINs from the Way You Tilt Your Smartphone

Discussing Six Most Critical Application Security Risks

Here’s a look at the six most critical application security risks that anyone could encounter today, in the age of aggressive cyber threats, malware attacks, virus protection tool etc… Let’s begin with security configuration related issues… Well, this is important, critically important. If there is a security misconfiguration, that is, if your security configuration is… Continue reading Discussing Six Most Critical Application Security Risks