Displaying items by tag: Exploit

Microsoft has been urged to reconsider its position on removing exploits from GitHub, the code repository which it acquired in 2018, after an incident in which it removed an exploit for Microsoft Exchange Server from the site.

Published in Security

A researcher has released exploit code for taking advantage of a vulnerability in Microsoft's implementation of the server message block protocol in Windows, a flaw that was described as SMBGhost at the time it became known.

Published in Security

After Google's very scary sounding Project Zero security report suggesting groups making a "sustained effort to hack the users of iPhones in certain communities over a period of at least two years", Apple has struck back.

Published in Security

Cloud endpoint protection provider CrowdStrike has released research revealing a threat spends an average of 86 days in a corporate network before it is detected, despite needing under two hours to move laterally to other systems on the network.

Published in Security
Thursday, 28 September 2017 04:21

Equifax breach identity fraud could last many years

Credit-reporting company Equifax Inc's massive data breach compromised the personal information of up to 143 million Americans and continues to dominate the news as even San Francisco city joins in the rage.

Published in Security

Open-source web platform Meteor has disclosed a recently discovered vulnerability which can break MongoDB protections.

Published in Open Source

A serious vulnerability in most versions of Android has been revealed before any major phone vendors have released patches for their devices.

Published in Mobility

Evidence exists online that Catch of the Day could have disclosed its May 2011 vulnerability back in February 2012 but chose not to.

Published in Security

Online daily dealing shopping site catchoftheday.com.au has written to its customers to advise them that some of their details may have been compromised ... three years ago.

Published in Security

KACE is a common systems and asset management, ticketing and reporting system used within enterprises. A new security flaw has been posted, revealing a hardcoded backdoor security key which allows arbitrary files to be uploaded.

Published in The Linux Distillery
Monday, 05 August 2013 13:34

The FBI peels away at TOR illegal activity

TOR is the dark side of the Internet, the so-called dark web, which provides a safe haven to privacy advocates but is also where drugs, child pornography, assassins for hire and other weird and illegal activities can allegedly be traded. The FBI has made a massive dent in the TOR network, compromising half of all TOR sites.

Published in Security

Some people got very excited when word spread of the discovery of a 'scary' vulnerability in Android that could be exploited to modify an application without the operating system detecting that the app's signature and content no longer match.

Published in Mobility
Monday, 14 January 2013 09:31

Apple shuts out vulnerable Java plugin

Apple moved relatively quickly to protect Mac users from exploits of a Java vulnerability revealed last week.

Published in Security
Wednesday, 29 August 2012 08:47

Java zero-day affects multiple platforms

A serious Java vulnerability is being exploited in the wild.

Published in Security

Cyber threats come and go, but the latest research suggests that the naughty lads of the Internet have settled into something of a groove; albeit a very effective and efficient one.  They're also worried about software piracy!

Published in Security
Wednesday, 16 November 2011 13:34

M86 Security predicts next year's Internet threats

There is merit in knowing (in general) where the major Internet threats will come from in the near future.  Clearly, we can't predict the exact future, but we can extrapolate the trends.

Published in Security

In April this year, a vulnerability was discovered in a commonly used critical infrastructure Web Access product.  Exploitable code was also made available.  The manufacturer has announced that no patch will be released.

Published in Security

Apple has released iOS security updates that plug a vulnerability that's been used to jailbreak devices. Before the howls of protest start, remember that such vulnerabilities can also be used for evil.

Published in Mobility

A recent survey of 250 Australian businesses found that their greatest fear was some kind of cyber attack; exceeding their fear of terrorism and natural disasters.

Published in Security
Wednesday, 12 January 2011 11:00

Microsoft's gentle start to 2011 patching

The first Patch Tuesday for 2011 has proved a quiet affair with just two bulletins from Microsoft, only one of which is rated critical.

Published in Security
Page 1 of 4




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News