web analytics

Neptune 4.5.4 Arrives with Linux Kernel 3.18.48 LTS, Dozens of Security Fixes

The newer Linux 4.9.18 LTS kernel is available in the repos                                     Apr 7, 2017 20:40 GMT  ·  By Marius Nestor   The developers behind the Debian-based Neptune Linux distribution announced today, April 7, 2017, the release and immediate availability for download of the fourth maintenance update to the Neptune 4.5 stable series… Continue reading Neptune 4.5.4 Arrives with Linux Kernel 3.18.48 LTS, Dozens of Security Fixes

Jailbreaking puts mobile users at risk

7th April 2017 By Sead Fadilpašić                                               Mobile users frequently stray from official app stores when looking for new mobile applications, putting themselves under increased risk from malware, ransomware and other malicious actors. This is according to a new report by RiskIQ, which says that users in the… Continue reading Jailbreaking puts mobile users at risk

Baseband Zero Day Exposes Millions of Mobile Phones to Attack

By Tom Spring April 7, 2017 , 4:10 pm                                                    MIAMI—A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference by researcher Ralf-Phillip Weinmann, managing director at security firm Comsecuris. In one attack scenario, the vulnerability… Continue reading Baseband Zero Day Exposes Millions of Mobile Phones to Attack

QNAP NAS devices open to remote command execution

Zeljka Zorz – April 7, 2017   If you’re using one of the many QNAP NAS devices and you haven’t yet upgraded the QTS firmware to version 4.2.4, you should do so immediately if you don’t want it to fall prey to attackers.                                              … Continue reading QNAP NAS devices open to remote command execution

A huge trove of patient data leaks, thanks to telemarketers' bad security

The data of almost a million patients with diabetes and other medical ailments has been secured.                                     By Zack Whittaker for Zero Day | April 7, 2017   A trove of records containing personal and health information on close to a million people was exposed after a former developer working at a telemarketing… Continue reading A huge trove of patient data leaks, thanks to telemarketers' bad security

New Macro-Based Malware Attacks Windows and MacOS systems

A new form of Microsoft Word macro-based malware has been discovered by cyber security researchers. This malware can affect both Windows and MacOS systems but follows different methods of attack for each operating system. The malicious macro is built-up on VBA (Visual Basic for Applications) code and contains instructions to automatically execute when the file… Continue reading New Macro-Based Malware Attacks Windows and MacOS systems

Dangerous subject lines to watch for

  Cybercriminals initiate their attacks through hyperlinks or attachments within emails. Most of these attacks use urgency or take advantage of user trust and curiosity to entice victims to click. Here are examples of subject lines to be cautious of.    Something as innocuous as a email subject line can be one of the most… Continue reading Dangerous subject lines to watch for

Sprawling Sathurbot Takes Aim at WordPress, Movie Pirates

6th April 2017 By Tara Seals   Movie piracy is alive and well—as are the bad actors that look to prey on the pirates.   ESET has uncovered a new ecosystem for the Sathurbot backdoor Trojan, consisting of more than 20,000 infected computers. This iteration has been active since at least June 2016, and is… Continue reading Sprawling Sathurbot Takes Aim at WordPress, Movie Pirates

PLCs From Several Vendors Vulnerable to Replay Attacks

By Eduard Kovacs on April 06, 2017   Programmable logic controllers (PLCs) from several major vendors are affected by implementation flaws that can be exploited by attackers to execute arbitrary commands on the vulnerable devices, researchers warned. The vulnerabilities, identified by ICS security firm CRITIFENCE, are related to the Modbus communications protocol, which is often… Continue reading PLCs From Several Vendors Vulnerable to Replay Attacks

Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox

See Also – Tried-and-true Triada supplants Hummingbad as top mobile malware   Nothing new to see here!   David Bisson | April 6, 2017   An Android spyware family is using the DroidPlugin open-source sandbox to evade detection by anti-virus software installed on infected devices.   The offending trojan, which goes by the name Triada,… Continue reading Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox