Friday, May 25th, 2018
The FBI is advising users of consumer-grade routers and network-attached storage devices to reboot them as soon as possible to counter Russian-engineered malware that has infected hundreds of thousands devices.
Researchers from Cisco’s Talos security team first disclosed the existence of the malware on Wednesday. The detailed report said the malware ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, January 12th, 2018
Following on the heels of the revelations of the Meltdown and Spectre vulnerabilities plaguing decades of Intel's processors, a new flaw in the Active Management Technology (AMT) has left Intel in even more hot water among the cybersecurity community.
The new flaw targets laptops, especially those powered by Intel's enterprise-focused vPro ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, January 3rd, 2018
Windows, Linux, and macOS have all received security patches that significantly alter how the operating systems handle virtual memory in order to protect against a hitherto undisclosed flaw. This is more than a little notable; it's been clear that Microsoft and the Linux kernel developers have been informed of some ...
Posted in Hardware, Linux, Security, Windows | No Comments
Monday, September 11th, 2017
When a zero-day vulnerability becomes public, of which by its nature no patches or fixes are available at the time, one is enough for vendors to come to terms with in order to rapidly devise a solution.
D-Link now has 10 such previously-unknown bugs on its plate to fix.
Last week, security ...
Posted in Hardware, Internet, Networking, Security | No Comments
Friday, September 1st, 2017
On August 31, 2017, Nomotion released five vulnerabilities for two Arris modems used by AT&T U-Verse customers in the US. The vulnerabilities are of the following types:
Hardcoded Credentials (CWE-798)
Information Exposure (CWE-200)
Authenticated Command Injection (CWE-78)
Firewall Bypass (CWE-653)
The hardcoded credentials give attackers access to the device via SSH or HTTP/HTTPS. ...
Posted in Hardware, Internet, Networking, Security | No Comments
Page 1 of 4912345...102030...»Last »