Monthly Archives: April 2015

Routers Built with RealTek SDK Affected by Remote Command-Injection Bug

A vulnerability present in version 1.3 of RealTek SDK (software development kit), which is used in the development of broadband routers from D-Link and Trendnet, can be exploited by an attacker to execute arbitrary code on the device. Although only … Continue reading

Posted in Uncategorized | Leave a comment

Facebook’s login system is being hijacked by China’s Great Firewall

For the last three days, China’s Great Firewall has been intercepting the Javascript module from Facebook Login, which allows third-party sites to authorize users through Facebook infrastructure. First reported on Sunday, the attack causes sites using Facebook Login to redirect to … Continue reading

Posted in Uncategorized | Leave a comment

New Utility Decrypts Data Lost to TeslaCrypt Ransomware

Crypto-ransomware variants have enterprises on edge because of the threat of irreversibly damaged files. Some organizations, including most recently the Tewksbury, Ma., police department have gone as far as to pay hundreds of dollars in ransom for the recovery key. … Continue reading

Posted in Uncategorized | Leave a comment

Apparent cyberattack temporarily shuts down TMT website

The state Security Operation Center is investigating a distributed denial of service attack on Sunday that targeted the state’s official government website and a site maintained by the Thirty Meter Telescope project. A group calling itself Operation Green Rights, which … Continue reading

Posted in Uncategorized | Leave a comment

Nigerian accused of hacking bank computer to steal $340 million

A Nigerian man has been arraigned in an Abuja high court, charged with hacking into a bank server and siphoning out more than N68 billion (over $340 million, £225 million). The man, Stephen Omaidu, a graduate of Kogi State Polytechnic … Continue reading

Posted in Uncategorized | Leave a comment

Hack on the track: Signaling flaw leaves UK trains vulnerable

UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer, reports ITV. According to government advisor Professor David Stupples, the new European Traffic Rail Management System … Continue reading

Posted in Uncategorized | Leave a comment

Firmas del sistema de detección de intrusos

Cuál es el propósito de una firma de sistema de detección de intrusos? La respuesta es que queremos que el sistema nos avise cuando se produce un intento de intrusión. Pero tomemos un momento para pensar en otras razones por … Continue reading

Posted in Uncategorized | Leave a comment