Apple iOS v9.2.1 – Multiple PassCode Bypass Vulnerabilities (App Store Link, Buy Tones Link & Weather Channel Link)

Posted by Vulnerability Lab on Mar 07

Document Title:
===============
Apple iOS v9.2.1 – Multiple PassCode Bypass Vulnerabilities (App Store Link, Buy Tones Link & Weather Channel Link)

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1778

Video: http://www.vulnerability-lab.com/get_content.php?id=1779

Release Date:
=============
2016-03-07

Vulnerability Laboratory ID (VL-ID):
====================================
1778

Common…

First Mac OS X Ransomware Targets Apple Users

Mac users, even you are not left untouched!

The World’s first fully functional Ransomware targeting OS X operating system has been landed on Macs.

Ransomware – one of the fastest-growing cyber threats – encrypts the important documents and files on infected machines and then asks victims to pay ransoms in digital currencies so they can regain access to their data.

Though Ransomware

RIP Ray Tomlinson, The Creator of Email, Dies at 74

A computing legend who ‘changed the way the world communicates’ has died.

RAY TOMLINSON, the man who invented email as we know it today and picked the @ symbol for email addresses, passed away at the age of 75 following an apparent heart attack Saturday morning, according to reports.

Hard to believe but ‘the godfather of email’ has passed away.

His death was confirmed by Mike Doble,

Debian Security Advisory 3505-1

Debian Linux Security Advisory 3505-1 – Multiple vulnerabilities were discovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.

Debian Security Advisory 3504-1

Debian Linux Security Advisory 3504-1 – Alvaro Munoz and Christian Schneider discovered that BeanShell, an embeddable Java source interpreter, could be leveraged to execute classpath are vulnerable to this flaw if they deserialize data from an untrusted source.