[SECURITY] CVE-2016-8745 Apache Tomcat Information Disclosure
Monthly Archives: December 2016
Gentoo Linux Security Advisory 201612-31
Gentoo Linux Security Advisory 201612-31 – Two vulnerabilities have been found in exFAT allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.2.1 are affected.
Gentoo Linux Security Advisory 201612-30
Gentoo Linux Security Advisory 201612-30 – Multiple heap overflows in SoX may allow remote attackers to execute arbitrary code. Versions less than 14.4.2 are affected.
Gentoo Linux Security Advisory 201612-29
Gentoo Linux Security Advisory 201612-29 – A heap-based buffer overflow vulnerability in libmms might allow remote attackers to execute arbitrary code. Versions less than 0.6.4 are affected.
Why combining technology with standards could combat fraud
ESET’s Miguel Ángel Mendoza looks at why combining technology with standards could combat fraud.
The post Why combining technology with standards could combat fraud appeared first on WeLiveSecurity
![]()
Tor Project Releases Sandboxed Tor Browser 0.0.2
The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – has launched an early alpha version of Sandboxed Tor Browser 0.0.2.
Yes, the Tor Project is working on a sandboxed version of the Tor Browser that would isolate the Tor Browser from other processes of the operating system and limit its ability to interact or
![]()
Become a Linux Expert — Get this Online 5-Course Training Bundle
Linux is considered as one of the most favorite operating systems for hackers and security researchers. The open source operating system is often used for building technologies as it offers developers much room for modifications.
Linux is used on many hardware platforms, servers, gaming platforms, and much more. So it is essential for anyone, who want to become a Linux pro or seeking a
![]()
Microsoft Internet Explorer 9 IEFRAME CSelectionInteractButtonBehavior::_UpdateButtonLocation Use-After-Free
A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9.
How to Protect All Your Internet-Connected Home Devices From Hackers
How many Internet-connected devices do you have in your home? I am surrounded by around 25 such devices.
It’s not just your PC, smartphone, and tablet that are connected to the Internet. Today our homes are filled with tiny computers embedded in everything from security cameras, TVs and refrigerators to thermostat and door locks.
However, when it comes to security, people generally ignore to
![]()
Beware of New Celebrity Sex Tape (Scam) Leaked on Facebook!
If you came across a celebrity sex video on Facebook featuring Jessica Alba or any other celebrity, just avoid clicking it.
Another Facebook scam is circulating across the social networking website that attempts to trick Facebook users into clicking on a link for a celebrity sex tape that instead downloads malware onto their computers.
Once installed, the malware would force web browsers to
![]()
