Monthly Archives: April 2016
Panama Papers Graph Database Cracked Open For World+Dog
All Phones In India To Be Equipped With Panic Buttons From 2017
Platinum APT Group Abuses Windows Hotpatching
Microsoft disclosed details on the Platinum APT group and its arsenal of backdoors, keyloggers and its abuse of Windows hotpatching to load malicious code on compromised computers.
Malware goes nuclear
Malware has been spotted at a German nuclear plant, raising questions about the security of nuclear infrastructure – and the USB memory stick in your pocket.
The post Malware goes nuclear appeared first on Avira Blog.
RomPager 4.34 Authentication Bypass
RomPager versions 4.34 and below router authentication remover exploit.
Logwatch 7.4.3
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
Sophos XG Firewall (SF01V) Cross Site Scripting
Sophos XG Firewall (SF01V) suffers from a cross site scripting vulnerability.
This Tiny Computer has no Battery, Powered Wirelessly from Radio Waves
No matter how smart and fast your devices would be, the biggest issue is always with the battery technology.
Whenever you go to buy any electronic gadget — smartphone, laptop, or any wearable — the most important specification isn’t its processor speed or its camera quality but its Battery Backup, which is not getting better any time soon.
What if you could eliminate the very thing entirely
![]()
The perimeter is everywhere (so where is your data really?)
It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET’s Cameron Camp looks explores the challenges of data security.
The post The perimeter is everywhere (so where is your data really?) appeared first on We Live Security.
![]()
