Monthly Archives: August 2015
FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud
U.S. businesses are losing millions in fraudulent wire transfers that have their root in email compromises of accounts belonging to top executives.
Ins0mnia Will Let Your Apps Run Forever …
What if you wanted to terminate a malicious app but it would continue to run and run and run and run?
The post Ins0mnia Will Let Your Apps Run Forever … appeared first on Avira Blog.
Photo Transfer (2) v1.0 iOS – Denial of Service Vulnerability
Posted by Vulnerability Lab on Aug 28
Document Title:
===============
Photo Transfer (2) v1.0 iOS – Denial of Service Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1580
Release Date:
=============
2015-08-20
Vulnerability Laboratory ID (VL-ID):
====================================
1580
Common Vulnerability Scoring System:
====================================
3.4
Product & Service Introduction:…
PayPal Bug Bounty #119 – Stored Cross Site Scripting Vulnerability
Posted by Vulnerability Lab on Aug 28
Document Title:
===============
PayPal Bug Bounty #119 – Stored Cross Site Scripting Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1588
Video: http://www.vulnerability-lab.com/get_content.php?id=1587
Vulnerability Magazine:
http://magazine.vulnerability-db.com/?q=articles/2015/08/28/paypal-inc-bug-bounty-2015-stored-cross-site-vulnerability-disclosed-researcher
Release Date:…
LinuxOptic CMS 2009 – Auth Bypass Session Vulnerability
Posted by Vulnerability Lab on Aug 28
Document Title:
===============
LinuxOptic CMS 2009 – Auth Bypass Session Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1585
Release Date:
=============
2015-08-26
Vulnerability Laboratory ID (VL-ID):
====================================
1585
Common Vulnerability Scoring System:
====================================
8.1
Product & Service Introduction:…
Dogma India dogmaindia CMS – Auth Bypass Session Vulnerability
Posted by Vulnerability Lab on Aug 28
Document Title:
===============
Dogma India dogmaindia CMS – Auth Bypass Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1583
Release Date:
=============
2015-08-25
Vulnerability Laboratory ID (VL-ID):
====================================
1583
Common Vulnerability Scoring System:
====================================
8.1
Product & Service Introduction:…
Google to Pause Flash Ads in Chrome Starting Next Week
Google on Tuesday will begin pausing Flash ads by default in Chrome, a move that is designed mainly to help improve browser speed, but that will also be a security upgrade for users. The company announced the plan back in June and said this week that it will make the behavior the default setting for […]
LizardStresser: Six people arrested in connection with Lizard Squad’s DDoS attack tool
British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – a national newspaper, a school and a number of online retailers.
The post LizardStresser: Six people arrested in connection with Lizard Squad’s DDoS attack tool appeared first on We Live Security.
Infra : TLS redirection for lists.centos.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 As we announced it already (see https://lists.centos.org/pipermail/centos-announce/2015-August/021341.html) , the CentOS Project infra tream decided to implement/enforce TLS on a maximum of websites/web services. We have so implemented it for the mailman website : https://lists.centos.org Should you encounter an issue, feel free to either report it on https://bugs.centos.org, or in #centos-devel on irc.freenode.net. on behalf of the Infra team, - -- Fabian Arrotin The CentOS Project | http://www.centos.org gpg key: 56BEC54E | twitter: < at >arrfab -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iEYEARECAAYFAlXgJF4ACgkQnVkHo1a+xU7mMQCgjbMs2oNQ9WZaKjf4qkbLJ2xD TVgAn3eTiW8VOyyUHWbLOqVFEpmQo3rS =B5lj -----END PGP SIGNATURE-----