How to Make Remote Learning Work for Your Children
How to Make Remote Learning Work for Your Children l33tdawg Wed, 08/12/2020 – 22:28 more…Apple releases new software updates for iPhones, iPads, and Macs
Apple releases new software updates for iPhones, iPads, and Macs l33tdawg Wed, 08/12/2020 – 22:28 more…Mozilla cuts 250 jobs, says Firefox development will be affected
Mozilla cuts 250 jobs, says Firefox development will be affected l33tdawg Wed, 08/12/2020 – 22:28 more…Microsoft’s Dual-Screen Duo Is Here. The Timing’s Not Great
Microsoft’s Dual-Screen Duo Is Here. The Timing’s Not Great l33tdawg Wed, 08/12/2020 – 22:28 more…How SSL Works with a Website Firewall
It’s no secret that a secure sockets layer (SSL) encrypts data as it moves between a visitor’s browser and the site host. For many people, a single SSL appears to be sufficient for protecting data exchanged between visitors and their website. But what happens to your SSL protection when you add a web application firewall […] more…Security gap allows eavesdropping on mobile phone calls
Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers have shown that this is not always the case. They were able to decrypt the contents of telephone calls if they were in the same radio cell as their target, whose mobile phone they then called […] more…String Concatenation: Obfuscation Techniques
While string concatenation has many valuable applications in development — such as making code more efficient or functions more effective — it is also a popular way for attackers to obfuscate code and try to make it more difficult to detect. Let’s dig into how bad actors are leveraging this technique to conceal their malware. […] more…Internet Explorer and Windows zero-day exploits used in Operation PowerFall
Executive summary In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for Internet Explorer. Closer analysis revealed that the attack used a previously unknown full chain that consisted of two zero-day exploits: a remote code execution exploit for Internet Explorer and an elevation of privilege exploit for […] more…August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
The August batch of Patch Tuesday updates includes 120 updates for the Microsoft suite, with 17 fixes rated as Critical, and the remaining 103 ranked as Important. CVE-2020-1380 is a critical Internet Explorer (IE) vulnerability that can be abused for remote code execution (RCE), while CVE-2020-1464 is a Windows 10 security gap that can be […] more…Over 30 Vulnerabilities Discovered Across 20 CMS Products
Researchers have identified more than 30 vulnerabilities across 20 popular content management systems (CMS), including Microsoft SharePoint and Atlassian Confluence. read more more…DDoS attacks in Q2 2020
News overview Not just one but two new DDoS amplification methods were discovered last quarter. In mid-May, Israeli researchers reported a new DNS server vulnerability that lurks in the DNS delegation process. The vulnerability exploitation scheme was dubbed “NXNSAttack”. The hacker sends to a legitimate recursive DNS server a request to several subdomains within the […] more…All you need to hijack a Mac is an old Office document and a .zip file
All you need to hijack a Mac is an old Office document and a .zip file l33tdawg Sun, 08/09/2020 – 22:05 more…Intel Is Investigating How Confidential Data Ended Up Online
Intel Is Investigating How Confidential Data Ended Up Online l33tdawg Sun, 08/09/2020 – 22:05 more…Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers
Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers l33tdawg Sun, 08/09/2020 – 22:05 more…Chinese hackers have pillaged Taiwan’s semiconductor industry
Chinese hackers have pillaged Taiwan’s semiconductor industry l33tdawg Sun, 08/09/2020 – 22:05 more…PHP Binary Downloader
When possible, an attacker will want to avoid using specific functions in their PHP code that they know are more likely to be flagged by a scanner. Some examples of suspicious functions commonly detected include system and file_put_contents. In this malware dropper file we recently found on a compromised website, the attacker chose to create […] more…More information
- Over 30 Vulnerabilities Patched in Android
- Bye, privacy: Evernote will let its employees read your notes
- Your next car will be hacked. Will autonomous vehicles be worth it?
- Ubisoft customers told "change your passwords *now*"
- Apple fixes hole that leaked employees’ and developers’ personal info
- SSCC 143 – Heartbleed revisited, cybercrooks busted, failed malware cleanup censured by FTC [PODCAST]
- Cisco reorganizes engineering in a big way; veteran Ahuja out
- Microsoft Announces Zero-Touch Onboarding for ‘Defender for Endpoint’ on iOS
- Chinese Military Behind South China Sea Cyber Espionage Attacks
- Twitter security execs quit amid worries that Musk will violate FTC settlement