The headline reads Hidden Backdoor Found in Chinese-Made Equipment. Nothing New! Move Along! That headline by itself should scare you. Researchers found a hidden backdoor in a Double Technology GSM gateway used by telephone companies and VoIP providers. DblTek is based in Hong Kong. According to the security firm Trustwave, there is an account called […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Recently Cisco published a critical vulnerability alert regarding their Webex browser plugin. While the plugin vulnerability, which affected Firefox, Chrome and Internet Explorer, was very serious it points to a much bigger issue. First the plugin issue. The bug affects Webex Meeting Server, Meeting Center, Event Center, Training Center and Support Center. Due to a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When companies like Microsoft or Oracle develop software, they have massive teams who’s only job is to try and find bugs in the software. They also have made significant investments automated tools to help with software quality assurance. Still Microsoft usually patches 10-20 new bugs month after month. Oracle often patches 100 bugs a quarter. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Washington Post is reporting that Vice President Mike Pence used a personal email account to conduct government business when he was Governor of Indiana. The Veep says that his use of a personal email account is different than Clinton’s use of a personal email account and I do not want to turn this into […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Stewart International Airport has a long history. In 1930 Thomas Stewart convinced his Uncle to donate land for an airport to the city. In 1939 the U.S. Military Academy at West Point built the first airfield at Stewart and in 1948 it became Stewart Air Force Base. In 1970 the State of New York bought […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Application penetration testing or pen test is more critical than ever and news today is only the most recent example of why. Spiral Toys makes a line of Internet connected teddy bears (aka smart bears, I guess) that allows parents and children who were physically apart to share personal messages. Unfortunately for the purchasers of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]