So much for counter-phishing training: Half of people click anything sent to...
With a name or just a general description of some generic event, researchers were able to "spear-phish" half of their test subjects. (credit: Wikipedia) Security experts often talk about the...
View ArticleBugtraq: Cisco Security Advisory: Cisco WebEx Meetings Player Arbitrary Code...
Cisco Security Advisory: Cisco WebEx Meetings Player Arbitrary Code Execution
View ArticleBugtraq: Cisco Security Advisory: Cisco Small Business SPA3x/5x Series Denial...
Cisco Security Advisory: Cisco Small Business SPA3x/5x Series Denial of Service Vulnerability
View ArticleBugtraq: Cisco Security Advisory: Cisco Small Business 220 Series Smart Plus...
Cisco Security Advisory: Cisco Small Business 220 Series Smart Plus Switches SNMP Unauthorized Access Vulnerability
View ArticleVuln: Huawei FusionAccess HTTP Header Injection Vulnerability
Huawei FusionAccess HTTP Header Injection Vulnerability
View ArticleVuln: Multiple Huawei Products Information Disclosure Vulnerability
Multiple Huawei Products Information Disclosure Vulnerability
View ArticleNew cloud attack takes full control of virtual machines with little effort
Enlarge The world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips individual bits in computer memory. It's a technique that's so surgical and...
View ArticleISC Stormcast For Thursday, September 1st 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleMaxmind.com (Ab)used As Anti-Analysis Technique, (Thu, Sep 1st)
A long time ago I wrote a diary[1] about malware samples which use online geolocalization services. Such services are used to target only specific victims. If the malware detects that it is executed...
View ArticleVuln: Docker Local Denial of Service Vulnerability
Docker Local Denial of Service Vulnerability
View ArticleVuln: Joomla JS Jobs Extension 'index.php' SQL Injection Vulnerability
Joomla JS Jobs Extension 'index.php' SQL Injection Vulnerability
View ArticleVuln: RETIRED:Adobe Flash Player and AIR CVE-2016-4120 Unspecified Memory...
RETIRED:Adobe Flash Player and AIR CVE-2016-4120 Unspecified Memory Corruption Vulnerability
View ArticleVuln: Oracle Java SE CVE-2016-3498 Remote Security Vulnerability
Oracle Java SE CVE-2016-3498 Remote Security Vulnerability
View ArticleVuln: RETIRED: Multiple Dell SonicWALL Products CVE-2016-2397 Remote Code...
RETIRED: Multiple Dell SonicWALL Products CVE-2016-2397 Remote Code Execution Vulnerability
View ArticleVuln: RETIRED:Multiple Huawei OceanStor Products CVE-2016-5722 Information...
RETIRED:Multiple Huawei OceanStor Products CVE-2016-5722 Information Disclosure Vulnerability
View ArticleVuln: RETIRED: Apache Subversion CVE-2016-2167 Security Bypass Vulnerability
RETIRED: Apache Subversion CVE-2016-2167 Security Bypass Vulnerability
View ArticleVuln: Apple iOS/WatchOS/tvOS Security Bypass and Memory Corruption...
Apple iOS/WatchOS/tvOS Security Bypass and Memory Corruption Vulnerabilities
View ArticleVuln: RETIRED:Apple tvOS CVE-2016-4607 Multiple Memory Corruption...
RETIRED:Apple tvOS CVE-2016-4607 Multiple Memory Corruption Vulnerabilities
View Article“Foghorn” takes users out of phish-fighting with DNS “greylisting”
Enlarge / Go ahead and click it. You know you want to. Clickers gonna click. Despite mandatory corporate training, general security awareness, and constant harping about the risks of clicking on...
View ArticleISC Stormcast For Friday, September 2nd 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article