/Tag:exploit

Zero day exploit compromises all versions of Internet Explorer

Some APT-group are actively exploiting a new zero-day vulnerability in the code of the core of Internet Explorer.  Attacks recorded a slew of data from the attack, as reported by the blog that initially discovered the attack.   The problem, which experts describe as a double kill attack, affects all the latest versions of Internet [...]

By | 2018-04-23T15:48:02+00:00 April 23rd, 2018|IT Security, Software News|Comments Off on Zero day exploit compromises all versions of Internet Explorer

Hackers move upstream and target corporate supply lines

As security measures get more advanced, so to do the attacks trying to penetrate them.  And security experts are seeing a trend of hackers moving upstream, using large business supply chains against themselves.  The National Cyber Security Centre (NCSC) -- the cybersecurity arm of GCHQ -- and the National Crime Agency (NCA) have jointly produced [...]

By | 2018-04-17T11:46:47+00:00 April 17th, 2018|Hardware News, IT Security, Software News|Comments Off on Hackers move upstream and target corporate supply lines

Hackers use advertising algorithms to better tailor phishing sites

Hackers have a new trick up their sleeve, given the cacophony of data spewed out by users and collected by innumerable analytics agencies, malware is becoming able to track packets in this data, thus morphing into a more sophisticated and believable form of malware more capable of exploiting end users.   If you are trying [...]

By | 2018-03-22T14:20:11+00:00 March 22nd, 2018|IT Security, Software News|Comments Off on Hackers use advertising algorithms to better tailor phishing sites

Chrome remote desktop allows strangers to connect without a password

Security experts reported a security issue with the Mac version of the Chrome Remote Desktop extension, which allows attackers to gain access to a full user account without entering a password.  Chrome's Remote Desktop is a simple extension for the Chrome browser that allows users to access their desktop computers from other computers or smartphones, [...]

By | 2018-03-19T10:40:59+00:00 March 19th, 2018|IT Security, Software News|Comments Off on Chrome remote desktop allows strangers to connect without a password

Google attempts to restrict background camera access in new Android version

Journalists of XDA-Developers report that in the new version of the Android operating system, which is still known by the code name Android P, there will be important security changes regarding how applications access the microphone and camera, in a hope to ensure users of their security.   Two comments were found in the Android [...]

By | 2018-02-26T13:52:08+00:00 February 26th, 2018|Cell Phones, Software News|Comments Off on Google attempts to restrict background camera access in new Android version

The first Specter and Meltdown exploits appear

Experts on IT security warn that soon all of us can expect big problems. According to multiple credible cybersecurity companies, criminals are already developing viruses that exploit meltdown and specter, a security bug that affects every Intel chip made in the past couple years.  The security analysts reported the detection of 139 different malwares that [...]

By | 2018-02-01T15:02:46+00:00 February 1st, 2018|IT Security, Software News|Comments Off on The first Specter and Meltdown exploits appear

Windows and Linux Servers Vulnerable to Virus-Mining

Specialists in cybersecurity from the IT Check Point companies, Ixia and Certego found that more than 700 servers on Windows and Linux are infected with the malicious software RubyMiner, used for the latent mining of cryptocurrency. The first attacks were noticed last week, but the epidemic took on a new face only a few days ago. Cybersecurity [...]

By | 2018-01-18T11:10:29+00:00 January 18th, 2018|IT news and stories, IT Security|Comments Off on Windows and Linux Servers Vulnerable to Virus-Mining

Be careful, a malicious link could crash your iPhone.

If you send a malicious link that has spread to Twitter on iPhone, the device will freeze or go into reboot. The "Messages" application will then stop working. The scary part is you don't even need to click on the link to activate it, just being sent the link can be enough to crash the [...]

By | 2018-01-18T10:59:05+00:00 January 17th, 2018|Cell Phones|Comments Off on Be careful, a malicious link could crash your iPhone.

The biggest computer bug…ever?

Well this should be one to go down for the ages.  Usually, if a problem arises if it only affects a small percentage of users and can quickly be fixed with a small patch.  But, if I were to say, for example, that all Dell computers were suddenly hit with a bug that left kernel [...]

By | 2018-01-04T14:34:41+00:00 January 4th, 2018|IT news and stories|Comments Off on The biggest computer bug…ever?

Android exploit shows your screen to anyone

Specialists MWR Labs spoke up recently about a new, rather interesting vector of attacks on Android-devices. The researchers claim that their attack will work against gadgets running Lollipop, Marshmallow and Nougat, which is about 77.5% of all devices running the android operating system. The key component of the attack is the service MediaProjection, a program [...]

By | 2017-11-27T09:46:55+00:00 November 27th, 2017|Cell Phones, IT Security, Software News|Comments Off on Android exploit shows your screen to anyone