Items tagged with exploit
by
Rob Williams - Tue, Aug 30, 2016
If you operate a Web server that runs on Linux, we're here to give you a bit of a prod in case you haven't updated it in a while. A piece of ransomware called FairWare is floating around, and as you'll soon see, its name is ironic as it's...
Read more...
by
Rob Williams - Sat, Aug 20, 2016
We reported earlier this week on a large collection of exploits that have been put up for auction by a group that calls itself Shadow Brokers. The promise was that all of the files were sourced from a secret NSA group called Equation...
Read more...
by
Rob Williams - Thu, Aug 18, 2016
We wrote a couple of days ago about a huge treasure trove of alleged NSA-derived exploits that were hitting the market. That gold mine was accessed by a group calling itself Shadow Brokers, and it's been said that their source was Equation...
Read more...
by
Rob Williams - Fri, Jul 29, 2016
Nothing beats wireless for convenience, but whenever you transmit important data through the air, there's a risk that someone could be nearby, ready to intercept the signals before they reach their destination. If this sounds familiar, it...
Read more...
by
Rob Williams - Sun, Jul 10, 2016
With Nintendo's latest game - a mobile one, at that - the company has proven that there is still a lot of innovating to do in the market. While Pokemon GO is based on another title, Ingress, any game is going to have a greater chance of...
Read more...
by
Rob Williams - Tue, Jun 28, 2016
It seems impossible for the world to go a single week without a major security breach, so to fill the inevitable void this week is a hacker that goes by the name "thedarkoverlord," who claims to be in possession of a staggering 655,000...
Read more...
by
Rob Williams - Sun, Jun 19, 2016
We wrote earlier about the kind of success Google has been seeing with its Android bug bounty program -- success that has led the company to actually increase its rewards. Over the years, we've seen other major companies offer bug bounties...
Read more...
by
Rob Williams - Wed, Jun 15, 2016
It has been suggested that the microprocessors we use each and every day could pack in a bit more than we bargained for; namely, the tools needed for spying or undetectable access. And unfortunately, according to security researcher and...
Read more...
by
Rob Williams - Tue, Feb 23, 2016
The greatest benefit wireless peripherals offer is what they help cut down on: wires. Fewer wires means that our desktops are easier to keep clean, and we're not kicking wires as often under our desk. It's a win-win overall. Or is it? As...
Read more...
by
Brandon Hill - Fri, Dec 04, 2015
Security researchers thought that we were all rid of a pesky vulnerability that was initially patched over three years ago. The exploit takes advantage of code lurking within the “libupnp” library, which is included in the Portable SDK for...
Read more...
by
Rob Williams - Sat, Nov 21, 2015
We've talked lots in the past about vulnerabilities that hit home and enterprise routers, but not quite as much about cable modems, where the importance of good security is arguably even more paramount. The reason for that is that most...
Read more...
by
Joshua Gulick - Thu, Sep 17, 2015
Updated
The lock screen on your phone might not be foolproof as you thought. Researchers at The University of Texas at Austin released a demonstration this week of what they say is a vulnerability in mobile devices running Android 5.x...
Read more...
by
Brandon Hill - Fri, Aug 07, 2015
If you’re a Firefox user, you should update your browser immediately. Mozilla was informed earlier this week by an astute Firefox user that a Russian news site was was using malicious advertisements to take advantage of an exploit in the...
Read more...
by
Rob Williams - Fri, Jul 24, 2015
We reported earlier this week that a Jeep Cherokee could be remotely accessed and controlled, and I wouldn't blame anyone for being a skeptic. After all, what are the chances of someone remote being able to disable the transmission? Well...
Read more...
by
Rob Williams - Tue, Jul 21, 2015
One of the biggest concerns revolving around ever-improving vehicle technologies is the risk of their security being breached and an exploiter causing something bad to happen. After all, our vehicles are now kitted out with computers -...
Read more...
by
Rob Williams - Mon, Jul 13, 2015
We reported last week on a new zero-day vulnerability in Adobe Flash that was revealed following the leak of data from the Italian hacking group "Hacking Team". It's hardly a surprise when such a vulnerability is found in either Flash...
Read more...
by
Rob Williams - Wed, Jun 03, 2015
After mainboard vendors began adopting EFI en masse in recent years, security researchers all over have dissected the many different implementations out there to find that elusive crippling bug. Sometimes, though, such bugs are not...
Read more...
by
Rob Williams - Sun, Mar 22, 2015
It's always fun to see which security flaws get exploited at Pwn2Own, and this year's event has proven to be no exception. In fact, it could be considered to be one of the most exciting events to date, with JungHoon Lee exploiting three...
Read more...
by
Rob Williams - Thu, Mar 12, 2015
IBM's X-Force Application Security Research Team has discovered a severe bug that plagues the Dropbox SDK on Android, which apps can use to interact with the cloud storage service. Dubbed 'DroppedIn', unauthorized apps have been able to...
Read more...
by
Sean Knight - Thu, Aug 21, 2014
A weakness has been identified that could exist in Android, Windows, and iOS devices that can be used to obtain personal information. Discovered by a team of researchers, the vulnerability revolves around multiple applications running on a...
Read more...
by
Seth Colaner - Wed, Jul 09, 2014
In a Microsoft post announcing a mostly uninteresting list of products and their respective dates for when Microsoft will terminate support for them is a notable standout: Windows 7. Within the next six months, all versions of Windows 7...
Read more...
by
Ray Willington - Sun, Sep 22, 2013
While perhaps a bit unnerving, let's not act like this hasn't happened before. While Apple's engineering team is no doubt massive, there's only so much a fixed group can find. We're talking about bugs in particular; while iOS 7's final...
Read more...