The Ottawa Hospital has confirmed its computer network was infected with ransomware this week, as four of its 9,800 machines were affected.
The post Ottawa Hospital computers infected by Ransomware virus appeared first on We Live Security.
![]()
The Ottawa Hospital has confirmed its computer network was infected with ransomware this week, as four of its 9,800 machines were affected.
The post Ottawa Hospital computers infected by Ransomware virus appeared first on We Live Security.
![]()
Highlights from the past seven days in information security include an Android banking trojan that not only poses as Flash Player, but is able to bypass 2FA as well.
The post The security review: Android banking trojan poses as Flash Player appeared first on We Live Security.
![]()
Not all is OK in the Android Market. If you occasionally download some of the most popular applications from Google Play Store, be aware that cyber-criminals have prepared a little surprise for you: a porn-clicker Trojan.
The post Android Market: beware the porn-clicker Trojan in Play Store appeared first on Avira Blog.
IBM WebSphere Commerce 6.x through 6.0.0.11, 7.x through 7.0.0.9, and 8.x before 8.0.0.3 allows remote attackers to cause a denial of service (order-processing outage) via unspecified vectors.
IBM Maximo Asset Management 7.6 before 7.6.0.3 IFIX001 allows remote authenticated users to bypass intended access restrictions and read arbitrary purchase-order work logs via unspecified vectors.
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.1.1 through 7.1.1.3, 7.5.0 before 7.5.0.9 IFIX004, and 7.6.0 before 7.6.0.3 IFIX001 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream.
pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the –enable-pt_chown option.
A local root privilege escalation vulnerability was found in Exim,
Debian’s default mail transfer agent, in configurations using the
perl_startup
option (Only Exim via exim4-daemon-heavy enables Perl
support).
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.