Old Hacks Never Die Brian Krebs is reporting that state government agencies are receiving malware laced CDs in the mail, hoping that someone is curious enough to place it in their computer and infect it. This is an older version of a ploy that is still common of dropping malware infected flash drives in areas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
All of us are used to using the Internet, right? What if you moved into your new home and after you paid for it and moved in you found out there was no Internet service available? One business in New York was told that Charter Communications, the local cable provider, would be happy to connect […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the ongoing saga of IoT security (The score is bad guys: a whole bunch, good guys: not very many), the bad guys continue to win. Researchers analyzed Samsung’s house management hub called SmartThings and found 20 problems. The researchers, part of Cisco, said that the attacks are complex and require the attackers to chain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Zip Slip Vulnerability Affects Thousands of Projects Researchers discovered a flaw in almost all zip-style file decompressors – RAR, TAR, 7ZIP-APK and others. The problem is caused by a very old attack vector called directory traversal that these libraries do not handle correctly. The decompressor libraries were likely downloaded from places like Github and Stack […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Enterprise Resource Planning (ERP) systems are quickly becoming a popular target of hackers. It used to be that these systems were on private networks behind firewalls, but as companies move to the cloud and include their vendors and subcontractors in their ERP systems, the systems are becoming more public. More public means easier to hack. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells. Backdoors are unauthorized ways to get into these systems in a way that bypasses security. Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]