Monthly Archives: April 2016
Man Jailed For Failing To Decrypt Hard Drives
German Nuclear Plant Hit By Computer Viruses
Adware From French Runs Away And Hides On 12M Machines
In-Brief: Telegram Vulnerability, Malware in Nuclear Plant, Anti-Tor Malware and Hotpatching Exploit
Clickjacking Vulnerability in Telegram Web Client
The official Telegram web-client that allows its users to access messenger account over desktop’s web browser is vulnerable to clickjacking web application vulnerability.
Egyptian security researcher Mohamed A. Baset told The Hacker News about a flaw in Telegram that could allow an attacker to change sensitive information of a Telegram user,
Former Tor Developer Created Malware for FBI to Unmask Tor Users
In Brief
According to an investigation, Matthew Edman, a cyber security expert and former employee of the Tor Project, helped the FBI with Cornhusker a.k.a Torsploit malware that allowed Feds to hack and unmask Tor users in several high-profile cases, including Operation Torpedo and Silk Road.
Do you know who created malware for the FBI that allowed Feds to unmask Tor users?
It’s an
Online Essentials: We’ve upped the security in your account and your device
Two-factor authentication is much more than just another password. By requiring that you have a second bit of information – or your device physically in hand – to successfully login, it makes it much harder for someone to pretend to be you – and gain unapproved access to your accounts and devices.
The post Online Essentials: We’ve upped the security in your account and your device appeared first on Avira Blog.
Packet Fence 6.0.0
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
Ransomware is everywhere, but even black hats make mistakes
Ransomware is everywhere. At least that might be the impression left by a seemingly endless stream of news reports on recent cyberattacks, reports ESET’s Ondrej Kubovič.
The post Ransomware is everywhere, but even black hats make mistakes appeared first on We Live Security.
Microsoft Windows Kernel win32k.sys TTF Processing Pool Corruption
A Microsoft Windows kernel crash exists in the win32k.sys driver while processing a corrupted TTF font file.