Thursday, February 20th, 2014
Adobe has released security updates to address a vulnerability in Adobe Flash Player 12.0.0.44 or earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 or earlier versions for Linux. Exploitation of this vulnerability could allow an attacker to take control of an affected system.
US-CERT recommends that users and administrators review ...
Posted in Internet, Linux, Security, Software, Windows | No Comments
Wednesday, February 19th, 2014
Smart home networks are rapidly gaining popularity, but some security experts worry that not enough encryption controls are coming with the products.
Security firm IOActive released an advisory (PDF) on Tuesday saying more than half a million Belkin WeMo devices are susceptible to widespread hacks. The firm uncovered several vulnerabilities in these devices, ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, February 18th, 2014
A new variant of the nefarious Zeus banking trojan – dubbed ZeusVM – is concealed in JPG image files, according to the collaborative findings of Jerome Segura, senior security researcher with Malwarebytes, and French security researcher Xylitol.
The act is known as steganography – concealing messages or images in other messages or images.
In ...
Posted in Internet, Security, Windows | No Comments
Monday, February 17th, 2014
After the massive security breaches at Target and Nieman Marcus recently, we could all stand to be more aware of the security features on our credit cards and debit cards and how banks protect our money. Some banks offer more security features than others. Let's take a look.
First, let's talk about what happens in ...
Posted in Internet, Privacy, Security | No Comments
Monday, February 17th, 2014
Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link.
Sent from
[email protected] and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, ...
Posted in Internet, Security | No Comments