Thursday, January 29th, 2015
At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered.
Todor Donev, a member of the Ethical Hacker research team, says that ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, January 28th, 2015
A highly critical vulnerability has been unearthed in the GNU C Library (glibc), a widely used component of most Linux distributions, that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines.
The vulnerability, dubbed "GHOST" and assigned CVE-2015-0235, was discovered and disclosed by the ...
Posted in Internet, Linux, Security | No Comments
Thursday, January 22nd, 2015
Mobile banking is an increasingly popular way to stay on top of one’s finances, with the ability to check balances, transfer money and even deposit checks virtually. Unfortunately, the sector is also a rich tapestry of criminal activity, with 11% of mobile banking apps categorized as “suspicious.”
According to research findings ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Wednesday, January 21st, 2015
2015 will be a year more smarter than 2014 with smarter mobile devices, smarter home appliances, and yes Smarter Automobiles. Nowadays, there are a number of automobiles companies offering vehicles that run on a mostly drive-by-wire system, meaning that a majority of the controls are electronically controlled, from instrument cluster ...
Posted in Hardware, Internet, Security | No Comments
Tuesday, January 13th, 2015
Remember when we discussed how passwords were dead? If you needed more proof that this is true, the bad guys have you covered with a new piece of malware that turned up in the wild.
SecureWorks, the security arm of Dell, has discovered the new piece of malware dubbed "Skeleton Key." ...
Posted in Internet, Security, Windows | No Comments