Sunday, August 5th, 2012
Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless.
The exploit successfully compromised a legacy authentication protocol, MS-CHAPv2, which was created by Microsoft years ago. But the vulnerabilities of this protocol (and other similar ones) ...
Posted in Internet, Networking, Privacy, Security | No Comments
Tuesday, June 19th, 2012
An unpatched critical security vulnerability in Microsoft's software, which means that users' computers can become infected simply by visiting a website with Internet Explorer, is being actively exploited by cybercriminals. Alongside last week's regular Patch Tuesday announcement (including a remote code execution vulnerability that is being exploited by attackers ...
Posted in Internet, Security, Software, Windows | No Comments
Wednesday, June 13th, 2012
Exploits for a recently revealed MySQL authentication bypass flaw are now in the wild, partly because the flaw is remarkably simple to exploit in order to gain root access to the database. The only mitigating factor appears to be that it depends on the C library that the MySQL database ...
Posted in Internet, Linux, Security | No Comments
Friday, June 8th, 2012
Today, Websense® Security Labs™ ThreatSeeker™ Network has seen a barrage of malicious emails pretending to be automated notifications from Craigslist. These emails instruct the recipient to click a link to complete a Craigslist request. The URLs in these emails redirect the user to malicious web sites hosting Blackhole Exploit Kit. So far we have ...
Posted in Internet, Security | No Comments
Thursday, September 8th, 2011
Hackers are using a new trick to cloak malicious files by disguising their Windows file extensions to make them appear safe to download, a Czech security company warned today.
The exploit, dubbed "Unitrix" by Avast Software, abuses Unicode for right-to-left languages -- such as Arabic or Hebrew -- to mask Windows ...
Posted in Internet, Security | No Comments