/Tag:exploit

Backdoor found in thousands of Android devices

Security researchers have discovered and reported a serious problem affecting tens of thousands of Android devices.  In particular, devices that are rooted or have been brought in for service recently are most vulnerable. This is because to root or do advanced diagnostics Android has a feature called the Android Debug Bridge, or ADB, which allows [...]

By | 2018-06-15T09:52:18+00:00 June 14th, 2018|Cell Phones, IT News, IT Security|Comments Off on Backdoor found in thousands of Android devices

Sites hosted by WordPress are open to a new exploit

Small business owners everywhere, be on red alert.  Cybercriminals have come up with a new way to introduce malicious plugins to sites running CMS WordPress, one of the most common web hosting and creation sites..  A new site-wide compromise technique involves the exploitation of poorly protected accounts in WordPress.com and a plugin by the name [...]

By | 2018-05-24T11:24:34+00:00 May 24th, 2018|IT News, IT Security, Software News|Comments Off on Sites hosted by WordPress are open to a new exploit

VPNFilter infects 500,000 routers across the globe

Cisco Systems Inc. announced today that a new type of malware, dubbed VPNFilter, is being spread among routers all across the internet, affecting over 500,000 devices worldwide.  Because most people don't have advanced enough routers to come with any sort of antivirus software, once infected, the end user is likely to have no indication their [...]

By | 2018-05-23T13:25:41+00:00 May 23rd, 2018|Hardware News, IT News, IT news and stories, IT Security|Comments Off on VPNFilter infects 500,000 routers across the globe

Your high tech car might be vulnerable to hackers

Many large automanufaturing companies, such as Land Rover, BMW and Volkswagen, for years have hid from consumers information about the safety risks exposed by many modern electronic services, according to an investigation by Daily Mail journalists. According to the resource, in 2013 researchers from the University of Birmingham revealed a vulnerability in a number of [...]

By | 2018-05-23T09:45:35+00:00 May 23rd, 2018|IT News, IT Security|Comments Off on Your high tech car might be vulnerable to hackers

Zero day exploit compromises all versions of Internet Explorer

Some APT-group are actively exploiting a new zero-day vulnerability in the code of the core of Internet Explorer.  Attacks recorded a slew of data from the attack, as reported by the blog that initially discovered the attack.   The problem, which experts describe as a double kill attack, affects all the latest versions of Internet [...]

By | 2018-04-23T15:48:02+00:00 April 23rd, 2018|IT Security, Software News|Comments Off on Zero day exploit compromises all versions of Internet Explorer

Hackers move upstream and target corporate supply lines

As security measures get more advanced, so to do the attacks trying to penetrate them.  And security experts are seeing a trend of hackers moving upstream, using large business supply chains against themselves.  The National Cyber Security Centre (NCSC) -- the cybersecurity arm of GCHQ -- and the National Crime Agency (NCA) have jointly produced [...]

By | 2018-04-17T11:46:47+00:00 April 17th, 2018|Hardware News, IT Security, Software News|Comments Off on Hackers move upstream and target corporate supply lines

Hackers use advertising algorithms to better tailor phishing sites

Hackers have a new trick up their sleeve, given the cacophony of data spewed out by users and collected by innumerable analytics agencies, malware is becoming able to track packets in this data, thus morphing into a more sophisticated and believable form of malware more capable of exploiting end users.   If you are trying [...]

By | 2018-03-22T14:20:11+00:00 March 22nd, 2018|IT Security, Software News|Comments Off on Hackers use advertising algorithms to better tailor phishing sites

Chrome remote desktop allows strangers to connect without a password

Security experts reported a security issue with the Mac version of the Chrome Remote Desktop extension, which allows attackers to gain access to a full user account without entering a password.  Chrome's Remote Desktop is a simple extension for the Chrome browser that allows users to access their desktop computers from other computers or smartphones, [...]

By | 2018-03-19T10:40:59+00:00 March 19th, 2018|IT Security, Software News|Comments Off on Chrome remote desktop allows strangers to connect without a password

Google attempts to restrict background camera access in new Android version

Journalists of XDA-Developers report that in the new version of the Android operating system, which is still known by the code name Android P, there will be important security changes regarding how applications access the microphone and camera, in a hope to ensure users of their security.   Two comments were found in the Android [...]

By | 2018-02-26T13:52:08+00:00 February 26th, 2018|Cell Phones, Software News|Comments Off on Google attempts to restrict background camera access in new Android version

The first Specter and Meltdown exploits appear

Experts on IT security warn that soon all of us can expect big problems. According to multiple credible cybersecurity companies, criminals are already developing viruses that exploit meltdown and specter, a security bug that affects every Intel chip made in the past couple years.  The security analysts reported the detection of 139 different malwares that [...]

By | 2018-02-01T15:02:46+00:00 February 1st, 2018|IT Security, Software News|Comments Off on The first Specter and Meltdown exploits appear