Are Microsoft actually taking security seriously this time around?
Windows has had plenty of problems with hackers because it was (and still is) the most popular operating system on the planet–but times have changed. Windows is still viciously popular, and is still the most commonly used operating system for desktop devices, but hackers have different priorities these days.
As a hacker, why bother trying to break into the ever updating Windows system to gain access to a company’s systems when their employees will click a hacker’s links in Twitter? Why hack a Windows computer to get financial information, when hackers can crack your PayPal or Skrill passwords and wire themselves as much money as they like? The answers to people’s secret questions for their bank accounts can be found by the information they have added to Facebook, and people will happily download unchecked and free apps to their phones. Read the rest of this entry »
Posted: August 25, 2015 in Articles
Tags: Comodo, Free VPN, VPN Services
Researchers warn: Free VPN Hola vulnerable to hacking
Around 52 million users are using Hola free VPN service (Free VPN, Secure Browsing, Unrestricted Access) in and around the world. The free service has made the hackers to constantly track the activity of any user. It has security issues and it has to be looked upon as it has higher chances of serious consequences. It is best advised by the security researchers to instantly call a farewell to the Hola VPN service.
The Hola VPN works in such a way that it provides a distinct marker that is specific to a single user. The identifier seems to be the same even after rebooting the system. Hola allows you to get tracked across the Internet. Read the rest of this entry »
Several new security vulnerabilities of varying severity has been found by security researchers
Several new security vulnerabilities of varying severity has been found by security researchers:
- System compromise in Android (high severity vulnerability)
- Bypassing security restrictions on Apache Tomcat (middle severity vulnerability)
- Multiple vulnerabilities in CMS Drupal (low severity vulnerability)
- Compromising the system in Apple QuickTime for Windows (high severity vulnerability) Read the rest of this entry »
Microsoft has corrected zero-day vulnerability in Internet Explorer
The flaw allows an attacker to gain complete control over the target device.
Microsoft has released an update that corrects zero-day vulnerability in Internet Explorer of versions 7-11 (this flaw does not appear to be present in new Microsoft Edge). The Critical Hole CVE-2015-2502 allows an attacker to remotely execute code on the target device.
According to Microsoft, the remote user can use a specially created a web-site to compromise a vulnerable system. The vulnerability is caused due to a memory corruption error when handling certain objects. Read the rest of this entry »
Hacking news 2015: The Hacking Team Hacking – Latest news
Recall, July 5, unknown hackers have broken into the computer network of the company and abducted more than 400 GB of corporate data.
Stolen information includes corporate documents, source code, and even, as it became known, a few exploits for zero-day vulnerability in Adobe Flash. Also, hackers managed to hack the official Hacking Team account in Twitter.
Hacking Team’s CEO David Vincenzetti issued a new statement promising that the company plans to deliver the recovered version of Galileo Remote Control System (Galileo, is the advanced and sophisticated spyware tool) and internal infrastructure to replace products that have been compromised in the cyber attacks. Read the rest of this entry »
Hacking of a spy cyber security firm “The Hacking Team”: Most Interesting articles
Here we provide 10 the most interesting and informative articles related to major hacking of a spy cyber security firm “The Hacking Team”.
The Italian company, Hacking Team is among a handful of companies that offer surveillance tools to law enforcement around the world. The Italian company is well-known for its controversial operations, helping governments and various intelligence agencies spy on citizens.
Hacking Team says its tools enable investigators to obtain information even if targets encrypt their communications to protect them.
5th July 2015, this Italian cyber security firm has itself become the victim of a hacking attack. Read the rest of this entry »
Firewalls protect the gateway to your network and to your data and applications, and maintaining threat protection is essential.
The problem is that firewalls are pretty stupid – they are like a security guard on the door of a club, allowing in only those guests who are on the list and rejecting anyone who Is not.
The problem is that hackers and emerging threats have become much more sophisticated in gaining entry, and in addition, modern business networks are much more porous than they once were – there are now multiple entry points into a network, and firewalls can be bypassed. Read the rest of this entry »
I would like to thank Malwarelist.net for posting this article. They have a great deal of useful articles on malware and other threats to your computer. I would encourage readers to check out some of their internet security articles once you are finished reading here.
Your blog or other WordPress website likely has a great deal of time and effort put into it, and often it can have great personal significance to the owner. There are people and programs out there, however, for one reason or another, that seek to disrupt it or otherwise take it over. That is why you need to be as security conscious as possible when using your WordPress website and administering it. The last thing you want is for your website to be the next victim in a long string of attacks. Read the rest of this entry »
Dangerous vulnerability has been fixed in Drupal. The most serious issue outlined in the advisory (CVE-2015-3234) allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts.
The victim must have an account in a certain OpenID-providers for a successful attack.
Vulnerabilities identified in the module OpenID, allows a potential attacker to log in as an administrator. However, for a successful attack the victim must have an account associated with the OpenID-providers (for example: Verisign, LiveJournal, StackExchange, and some other). Read the rest of this entry »
There is a new kid of the virus block, and a pretty nasty kid it is too. Named Rombertik, it is generally picked up from attachments on phishing emails (usually appearing to be a .PDF file in the case of this virus).
Maybe one of those emails you received claiming you have won a prize, claiming to be a message from Microsoft, or asking you to validate your bank details. Read the rest of this entry »