Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…Spam in May 2014
Spam in the spotlight In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. Holiday spam for Mom As usual, the spammers were very busy in the […] more…More information
- Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day
- Is there a cure for cancer sitting at the back of the medicine cabinet already?
- Microsoft Patches Windows Zero-Day Exploited by ‘FruityArmor’ Group
- Hackers exploit Magento e-commerce vulnerability
- Remove extra card from newly installed Cisco VG350 Gateway at Beaver Campus
- Industry is Not Prepared for the IIoT Attacks that Have Already Begun
- Passwords stolen from Mail.Ru were old, the company says
- Taking control back from the cloud
- The Upload: Your tech news briefing for Friday, July 10
- Lenovo ThinkPad USB-C Dock CVE-2019-6176 Unspecified Denial of Service Vulnerability