-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: April 2015
Routers Built with RealTek SDK Affected by Remote Command-Injection Bug
A vulnerability present in version 1.3 of RealTek SDK (software development kit), which is used in the development of broadband routers from D-Link and Trendnet, can be exploited by an attacker to execute arbitrary code on the device. Although only … Continue reading
Posted in Uncategorized
Leave a comment
Facebook’s login system is being hijacked by China’s Great Firewall
For the last three days, China’s Great Firewall has been intercepting the Javascript module from Facebook Login, which allows third-party sites to authorize users through Facebook infrastructure. First reported on Sunday, the attack causes sites using Facebook Login to redirect to … Continue reading
Posted in Uncategorized
Leave a comment
New Utility Decrypts Data Lost to TeslaCrypt Ransomware
Crypto-ransomware variants have enterprises on edge because of the threat of irreversibly damaged files. Some organizations, including most recently the Tewksbury, Ma., police department have gone as far as to pay hundreds of dollars in ransom for the recovery key. … Continue reading
Posted in Uncategorized
Leave a comment
Apparent cyberattack temporarily shuts down TMT website
The state Security Operation Center is investigating a distributed denial of service attack on Sunday that targeted the state’s official government website and a site maintained by the Thirty Meter Telescope project. A group calling itself Operation Green Rights, which … Continue reading
Posted in Uncategorized
Leave a comment
Nigerian accused of hacking bank computer to steal $340 million
A Nigerian man has been arraigned in an Abuja high court, charged with hacking into a bank server and siphoning out more than N68 billion (over $340 million, £225 million). The man, Stephen Omaidu, a graduate of Kogi State Polytechnic … Continue reading
Posted in Uncategorized
Leave a comment
Hack on the track: Signaling flaw leaves UK trains vulnerable
UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer, reports ITV. According to government advisor Professor David Stupples, the new European Traffic Rail Management System … Continue reading
Posted in Uncategorized
Leave a comment
Firmas del sistema de detección de intrusos
Cuál es el propósito de una firma de sistema de detección de intrusos? La respuesta es que queremos que el sistema nos avise cuando se produce un intento de intrusión. Pero tomemos un momento para pensar en otras razones por … Continue reading
Posted in Uncategorized
Leave a comment
Sony Email Hack: GCs Tussle Over Nude Video Game Images
Of the thousands of Sony Corp. internal emails that WikiLeaks has posted online, at least 1,729 of them pertain in some way to “general counsel,” according to a search by CorpCounsel.com Tuesday. The emails reveal numerous discussions involving the company’s … Continue reading
Posted in Uncategorized
Leave a comment
New Ransomware “Threat Finder” Delivered by Angler Exploit Kit
Information about the ransomware emerged in late January, when a user reported that Threat Finder was able to encrypt his data, bypassing detection of antivirus products he had installed. Ransomware delivered by Bedep malware Rackspace security researcher Brad Duncan found … Continue reading
Russian hacking group reportedly exploited Flash, Windows
A group of Russian hackers has been using flaws in two popular pieces of software — Adobe’s Flash and Microsoft’s Windows operating system — to try to get information about other governments, according to a report published by FireEye, a … Continue reading
Posted in Cyber Security
Leave a comment