appleupdate 0

Apple released security updates to patch critical iOS, macOS, watchOS and tvOS vulnerabilities.

If you own Mac, iPhone (5 and later), iPad (4th generation and later), iPod touch (6th generation and later), Apple TV (4th generation) or Apple watch, you need to install the latest Apple security updates. Company has released security updates for it’s operating systems including iOS, macOS, OS X, tvOS and watchOS to patch critical vulnerabilities. Some of these vulnerabilities allows an attacker...

42 total views, 42 views today

backdoor 0

Linux.BackDoor.FakeFile.1, the new Linux backdoor detected in the wild

Although the vast majority of malware is created to attack Windows operating systems, Linux systems can be infected as well. Because Linux is one of the most widely and constantly used operating systems in desktop computers, web servers, IoT devices, embedded systems, routers, surveillance cameras or different server infrastructures, it becomes a valuable target for cyber criminals. Security firms observing increase in malware types...

105 total views, 4 views today

weeblykapak 0

Over 43 million Weebly accounts leaked. FourSquare breach claimed.

Unfortunately data breach news keeps coming every week. After LinkedIn, Dropbox, Tumblr, MySpace and record-breaking Yahoo data breach (500 million accounts was compromised), now popular web-hosting company Weebly confirmed that more than 43 million user’s account information including usernames, passwords, email and ip addresses obtained by an unauthorized party. According to Weebly, this data breach affects customers who registered before March...

74 total views, 1 views today

juniperkapak 0

Juniper released software updates to fix vulnerabilities in Junos CLI, Junos Space, CTPView, vMX and Junos J-Web interface.

Juniper released software updates to fix some critical vulnerabilities in Junos OS Command Line Interface, Junos Space, CTPView, Virtual MX series (vMX) router software and Junos OS J-Web interface. Junos Space Network Management Platform vulnerabilities Junos Space Network Management Platform contains critical vulnerabilities and any Juniper products/platforms running Junos Space prior to version 15.2R2 need to be updated as soon as possible. According...

86 total views, 5 views today

miraikapak 0

Mirai malware infecting AirLink Cellular Gateway devices, password change needed!

Mirai is a dangerous malware that is designed to infect Internet of Things (IoT) devices by scanning the internet for devices with factory default passwords in order to make these devices a part of a botnet and to perform DDoS attacks. Mirai is also the bot used in one of the largest DDoS attacks. Brain Kreb’s blog was recently targeted by a...

167 total views, 3 views today

dns_bind2 0

Ongoing DoS attacks against BIND DNS software reported, update needed!

BIND is the most widely used ‘Domain Name System’ (DNS) software on the Internet, which originally designed for BSD operating systems. And it is a de facto standard on Unix-based systems. On September 27, Internet Systems Consortium (ISC) released a security advisory to highlight a critical vulnerability that allows remote attackers to cause a denial-of-service (DoS) via a crafted query. It is one...

194 total views, 8 views today

symdata 0

Windows Script File ( WSF ) attachments being increasingly used for ransomware delivery.

Spam emails are one of the mostly used mediums by attackers in an attempt to trick the user into opening the mail and clicking on the links within the mail or opening a malicious attachment, which leads to malware infection. And it seems that malicious Windows Script Files (WSF) are the latest file types being used by cyber criminals recently to spread ransomware....

273 total views, no views today

oversightlogo 0

How to protect your Mac against webcam spying with a free tool

‘Webcam hijacking’ is one of the mostly used attack types when the attacker wants to spy on his target. By infecting a computer with Remote Access Trojans (RAT), an attacker becomes able to access and control victim’s webcam device (besides controlling other hardware components or OS functions and remotely accessing files). Since Remote Access Trojans are openly available and a simple to use malware...

91 total views, 5 views today

ubybbt 0

‘U by BB&T’ iOS banking application fails to properly verify SSL certificates

‘Improper certificate validation’ is simply a vulnerability in which a software fails to properly validate certificates provided by HTTPS connections. This vulnerability allows a man-in-the-middle attacker to spoof servers and obtain sensitive information (such as login credentials) via a crafted certificate. If you are using ‘U by BB&T’ application, the mobile banking application of ‘BB&T-Branch Banking and Trust’ (one of the largest financial...

182 total views, 7 views today

cerberlogo 0

How to decrypt files encrypted by Cerber ransomware?

If your files are encrypted and turned into random file name of 10 characters with the file extension “.cerber”, and you see a ransom message saying “Your documents, photos, databases and other important files have been encrypted!”, then you are a victim of the Cerber ransomware, version 1 (Cerber V1). The good news is you don’t have to pay anything, because a...

481 total views, 8 views today