David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.
The post Spanish Harmada: More on tech support scams appeared first on WeLiveSecurity
![]()
David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.
The post Spanish Harmada: More on tech support scams appeared first on WeLiveSecurity
![]()
The Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS mishandles a series of mmap system calls for /dev/zero with different starting addresses, with a stated impact of “allowing for a local user to possibly gain root access,” aka an “inode integer overflow.”
A vulnerability in the Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS allows any user to send a SIGIO signal to any process. If the process does not catch or ignore the signal, it will exit.
With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.
The post Ghost in the Shell: Fantasy meets reality with cybersecurity themes appeared first on WeLiveSecurity
![]()
[SECURITY] [DSA 3827-1] jasper security update
[slackware-security] libtiff (SSA:2017-098-01)
Foscam All networked devices, multiple Design Errors. SSL bypass.
ChromeOS / ChromeBooks Persist Certain Network Settings in Guest Mode
Jobscript4Web version 4.5 suffers from a remote SQL injection vulnerability that can be leveraged for authentication bypass.
Release Date: April 10, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.8.0 and below
Vulnerability Type: SQL Injection
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)
CVE: not assigned yet
Problem Description: The extension fails to properly sanitize user input and is susceptible to SQL Injection.
Solution: An updated version 1.8.1 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/sf_event_mgt/1.8.1/t3x/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Torben Hansen who discovered and reported the vulnerability.
Note: In case you extended the controller of the sf_event_mgt extension in your own extensions, be sure to apply the fix there too.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.