Integer overflow in the dwarf_die_deliv.c in libdwarf 20160613 allows remote attackers to cause a denial of service (crash) via a crafted file.
Monthly Archives: February 2017
CVE-2016-6872
Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
Hackers Are Using Android Malware To Spy On Israeli Military Personnel
A group of highly sophisticated state-sponsored hackers is spying on the Israeli military by hacking into the personal Android phones of individual soldiers to monitor their activities and steal data.
A newly released research by Lookout and Kaspersky suggests that more than 100 Israeli servicemen from the Israeli Defense Force (IDF) are believed to have been targeted with spyware.
<!–
![]()
tomcat-8.0.41-1.fc25
Security fix for CVE-2016-8745
tomcat-8.0.41-1.fc24
Security fix for CVE-2016-8745
Neil deGrasse Tyson Talks Science And Snowden At RSA
Hackers Are Using Android Malware To Spy On Israeli Soldiers
German Parents Told To Destroy Cayla Dolls Over Hacking Fears
Republicans Are About To Nuke The FCC's Broadband Privacy Rules
Prevention: One-Third Of A Healthy Cybersecurity Regimen
Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you might think.
In the first of a three-part series, I’ll address how a framework consisting of these three pillars provides the basics for effective cybersecurity.
![]()
