Thursday, March 26th, 2015
DLL hijacking is an attack that makes applications load malicious dynamic link libraries instead of the intended -- clean and legit -- library on a Windows system.
Programs that don't specify paths to libraries are vulnerable to DLL hijacking as Windows uses a priority based search order in this case to ...
Posted in Internet, Security, Windows | No Comments
Thursday, March 12th, 2015
[Dark Purple] recently heard a story about how someone stole a flash drive from a passenger on the subway. The thief plugged the flash drive into his computer and discovered that instead of containing any valuable data, it completely fried his computer. The fake flash drive apparently contained circuitry designed ...
Posted in Hardware, Security | No Comments
Wednesday, January 21st, 2015
2015 will be a year more smarter than 2014 with smarter mobile devices, smarter home appliances, and yes Smarter Automobiles. Nowadays, there are a number of automobiles companies offering vehicles that run on a mostly drive-by-wire system, meaning that a majority of the controls are electronically controlled, from instrument cluster ...
Posted in Hardware, Internet, Security | No Comments
Friday, December 19th, 2014
Nearly a year ago, Target suffered one of the largest security breaches that resulted in over 70 million credit and debit cards being compromised. At the time, Target wasn't alone, with other retailers suffering the same fate during the crucial holiday season. Nearly a year later, Staples has also become ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 6th, 2014
As many as four out of five internet-connected households in the US could be at risk of attack through their wireless router.
This is among the findings of a study by security specialist Avast which found that more than half of all home routers are poorly protected using default or easily ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments