Posted: November 23, 2015 in Articles
Tags: cyber security, security tools
Well, who doesn’t loves to access free software for their download purposes?
Everyone surely wants to access these opportunities as and when available.
Recently, there was an unscientific poll organized in the country where it was asked to multiple readers to acknowledge about their most wanted free information security accessing tools. And here are few security software to deal with the privacy policies of protecting websites as well as mobile applications. Here we go: Read the rest of this entry »
Information security experts have found 11 flaws in the Samsung Galaxy S6 Edge
Information security experts from Google Project Zero found the eleven dangerous vulnerabilities in Galaxy S6 Edge from Samsung, and was immediately reported to the manufacturer.
Samsung released the update which fixes eight holes in October this year. Three the least dangerous vulnerabilities will be eliminated this month. Read the rest of this entry »
Critical vulnerability in the Xen hypervisor
The critical elevation privilege vulnerability has been corrected in the hypervisor Xen. This gap allows to gain control over the host server. Seven years this problem is present in the Xen code base.
The developers of the Xen hypervisor released nine security patches, eliminating multiple vulnerabilities in the server software. One of the flaws could allow an attacker to gain control over the host server. We are talking about the vulnerability CVE-2015-7835 (XSA-148), by which the paravirtualization guest can manage memory OS of the host and other virtual machines. The problem was discovered by engineers Alibaba, which recently joined the development of Xen. Read the rest of this entry »
A critical vulnerability in the popular Shockwave Player
The vulnerability allows a remote attacker to compromise an affected system.
Yesterday, October 27, Adobe has released a security bulletin APSB15-26, which was fixed a dangerous vulnerability in the product Shockwave Player. The flaw could allow an attacker to execute arbitrary code on the target system. Read the rest of this entry »
Five vulnerabilities in the content management system Joomla!
These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights.
The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of flaws allows an attacker to remotely elevate privileges using the SQL-injection and obtain administrator rights on most web-sites running Joomla!. Read the rest of this entry »
Three High severity vulnerabilities of the last week
Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger.
1. Execution of arbitrary code in Avast Antivirus
The number of vulnerabilities: 1
Vector of operation: Remote
Impact: System Compromise
Affected Product: Avast Antivirus
Vulnerable version: Avast Antivirus 2015.10.3.2223, possibly earlier versions Read the rest of this entry »
WinGuard Pro – application that allows you to lock some of the features of your system, as well as the implementation and installation of programs to limit the use of your PC, secures your computer by password protecting your Windows applications, programs and locking EXE files.
With this program you can password protect your programs, windows and web pages in one easy to use program. Read the rest of this entry »
New Android Critical Vulnerabilities
1. CVE-2015-1538 Exploit for Android is Now Available for Testing Purposes
This exploit has several caveats. First, it is not a generic exploit. Zimperium Team only tested it to work on a single device model. Zimperium Team tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in heap layout, this is not a 100% reliable exploit by itself.
Zimperium Team were able achieve 100% reliability when delivered through an attack vector that allowed multiple attempts. Finally, this vulnerability was one of several that was neutered by GCC 5.0’s ‘new’ integer overflow mitigation present on Android 5.0 and later. Read the rest of this entry »
Posted: September 7, 2015 in Articles
Tags: firewall, VPN, VPN service
An introduction to the Great Firewall (GFW)
It is interesting to know that the Chines government has blocked many of the popular websites like, Facebook, Google, and the YouTube through the filtering system called Great Firewall (GFW).
There is still one way to bypass the security system, the VPN services. Read the rest of this entry »
Posted: September 4, 2015 in Articles
Tags: torrent, VPN, VPN provider, VPN service
The best VPN service is one that has the backing of many users from different geological location with the different devices and planes.
Remember, the most expensive VPN service don’t always mean the most reliable and fast.
The competitive environment allows the user to select the best VPN service even in cheap price. Read the rest of this entry »