As people use their mobile devices as what one friend used to call a “pocket super computer” as opposed to something where you dial 7 digits (remember that) and talk to someone, hackers have figured out that the new attack vector is your phone. In part, this is due to the fact that finally, after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Adobe seems to have trouble catching a break sometimes, Today they released an emergency patch for a vulnerability in the Cold Fusion application that Adobe bought in 2005. The bug allows an attacker to bypass the file upload restrictions, allowing an attacker to upload a malicious executable and then get the target system to execute […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We Don’t Need Back Doors in Crypto – We Have Enough Bugs Already! Researchers have found three new bugs in the protocol design (as opposed to the implementation) in both 4G and 4G cellular networks. The design flaws can be carried out by any person with a little knowledge of cellular paging protocols. The hardware to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just ONE day after the announcement of the NINETEEN YEAR OLD bug in the very popular WinRAR utility, Checkpoint Software found examples of it being exploited in the wild. Given that the vast majority of the 500 million copies will likely NEVER be patched and the fact that the bug allows the hacker to take […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many employees are at least curious about their next job. That is the basis for this attack. The attacker sends Linkedin direct messages from a legitimate Linkedin account. If that doesn’t appeal to the target, the attacker sends emails to the targets business email address suggesting a job offer. The links in the email points […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Over 5 Billion Records Exposed in 2018 Risk Based Security is reporting that there were 6,515 publicly reported breaches in 2018 exposing over 5 billion records. This is a couple hundred breaches less than 2017, but the final numbers are not in yet as breaches continue to be reported. The number of days between discovery […]
Continue reading →
[DISPLAY_ACURAX_ICONS]