Tag: Feedly

  • Running a Tor Exit Node for fun and e-mails

    Running a Tor Exit Node for fun and e-mails http://ift.tt/2cgKZJG Running a Tor Exit Node for fun and e-mails: Vulnerabilities via Ecstatic Security http://ift.tt/1TuVnt9 September 6, 2016 at 01:59PM

  • Google emits three sets of Android patches to fend off evil texts, files

    Google emits three sets of Android patches to fend off evil texts, files http://ift.tt/2cbb1fv It’s a smaller-than-usual Android patch bundle from Google – just 47 patches for 57 flaws. These software bugs can be exploited by installed apps or malicious code smuggled in multimedia messages and files to gain total control of vulnerable phones, tablets,…

  • Mirai Linux Trojan corrals IoT devices into DDoS botnets

    Mirai Linux Trojan corrals IoT devices into DDoS botnets http://ift.tt/2c6us67 Mirai, a newly discovered and still poorly detected piece of Linux malware, is being used to rope IoT devices into DDoS botnets. Researchers from MalwareMustDie have recently gotten their hands on several variants of the threat, and have discovered the following things: It comes in…

  • Sony’s PlayStation Network (PSN) Goes Down – Hack Read

    Sony’s PlayStation Network (PSN) Goes Down – Hack Read http://ift.tt/2cciKKt Sony’s PlayStation network (PSN) goes down and users are angry again — It is unclear if this was a DDoS attack or a technical error. Some Sony’s PlayStation network services including Account Management, Gaming And Social, PlayStation™Now and PlayStation™Vue are down right now and what’s irritating is that…

  • Building an Effective Network Defense Using Threat Intelligence

    Building an Effective Network Defense Using Threat Intelligence http://ift.tt/2c4rFux Based on Lockheed Martin’s experience in the aftermath of a data breach, the company advises organizations to diligently gather threat intelligence internally to support development of an effective mitigation strategy, says Chris Coryea, cyber intelligence specialist. Threat Intel via CERT-EU : EMM AlertFilter System: CERT-LatestNews http://ift.tt/1gYYfLb…

  • Numerous Cisco Devices Still Vulnerable to EXTRABACON

    Numerous Cisco Devices Still Vulnerable to EXTRABACON http://ift.tt/2c9DItq Cisco Patched Equation Group Exploit, But Uptake Lags, Rapid7 Warns Tens of thousands of Cisco Adaptive Security Appliance devices remain vulnerable to a zero-day exploit released last month as part of the Equation Group toolset dump by Shadow Brokers, according to scans conducted by security firm Rapid7.…

  • School ransomware: A threat to be aware of

    School ransomware: A threat to be aware of http://ift.tt/2ckW9tQ Ransomware that targets schools is a threat that needs to be understood, explains ESET’s Lysa Myers. Top cybersecurity efforts are needed to keep it at bay. The post School ransomware: A threat to be aware of appeared first on WeLiveSecurity. Threat Intel via CERT-EU : EMM…

  • SEC Consult SA-20160906-0 :: Private key for browser-trusted certificate embedded in multiple Aruba Networks / Alcatel-Lucent products

    SEC Consult SA-20160906-0 :: Private key for browser-trusted certificate embedded in multiple Aruba Networks / Alcatel-Lucent products http://ift.tt/2cgkeDJ Full Disclosure mailing list archives SEC Consult SA-20160906-0 :: Private key for browser-trusted certificate embedded in multiple Aruba Networks / Alcatel-Lucent products From: SEC Consult Vulnerability Lab <research () sec-consult com> Date: Tue, 6 Sep 2016 12:09:36…

  • Hackers “find Twitter exploit” and resurrect banned accounts

    Hackers “find Twitter exploit” and resurrect banned accounts http://ift.tt/2cwF2od This should be a Halloween tale: Twitter accounts long dead and buried have been resurrected by a Frankenstein-like bunch of hackers. We don’t know where they got the jolt of lightning to make these things burst from the grave, but as Business Insider reports, a hacking…

  • Banking Trojan, Gugi, evolves to bypass Android 6 protection

    Banking Trojan, Gugi, evolves to bypass Android 6 protection http://ift.tt/2cD6Co2 Almost every Android OS update includes new security features designed to make cybercriminals’ life harder. And, of course, the cybercriminals always try to bypass them. We have found a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added…