exploits

Thu
03
Aug
John Lister's picture

Google: 0-Day Bugs Down, But Risk Still High

The number of 0-day bugs, which give hackers a dangerous advantage, fell in 2022 according to Google. However, the company warns this may risk misleading complacency that forgets other factors. The figures come from Google's Threat Analysis Group, ... which aims to track, identify and report security bugs, regardless of the software or hardware concerned. The logic is that the better Internet security is overall, the better it is for an Internet-dependent business such as Google. For the past nine years, it's put together an annual tally of 0-day bugs. While definitions vary, Google classes them ... (view more)

Tue
12
Jan
John Lister's picture

100M Users Still Using Windows 7

As many as 100 million PCs could still be running Windows 7 according to a newly-published estimate. That's despite Microsoft withdrawing support for the 11-year old system last year. The estimate comes from Ed Bott of ZDNet and is based on data ... published at analytics.usa.gov. That brings together site visitor data from most US government agencies. It means the figures will primarily represent visitors from the United States. (Source: zdnet.com ) Bott notes that across the agencies, 8.5 per cent of visitors in the past 90 days were running Windows 7 and 3.4 percent running Windows 8 or 8.1. ... (view more)

Mon
08
Jan
Dennis Faas's picture

Can Malware (Spectre, Meltdown) Spy After Reboot?

In regard to last week's article on the Spectre and Meltdown CPU exploits, which affects 100% of all computers made since 1995, user 'rep' had the following question to ask: " Dear Dennis, [Being that this is a hardware exploit], am I right in ... thinking that any passwords, etc, which are stored in the CPU's memory are lost when the computer is shut down? If so, could I simply shut off the computer and reload it every time I want to use Internet banking and would that keep me safe from these exploits? " My response: I posted my original response in the comments section of Friday's article, but ... (view more)

Fri
05
Jan
Dennis Faas's picture

Spectre and Meltdown Exploits - What You Need to Know

Infopackets Reader Steve P. writes: " Dear Dennis, There has been a whirlwind of news on the Internet regarding the 'Spectre' and 'Meltdown' exploits that affect all microprocessors (CPUs) from 1995 and on. I am afraid my computer is at risk but I ... don't understand all the tecno-talk. Should I be worried? " My response: The short answer is: yes and no, mostly no (once patches are released). At the end of this article I'll offer advice on what you can do to stay protected. What does the Spectre and Meltdown Exploit Mean? I have been following the news for the last few days and here is what I ... (view more)

Wed
09
Sep
Dennis Faas's picture

Zero-day Attack

A zero-day or "0day" attack is a computer threat that tries to exploit computer application vulnerabilities for which no security fix is yet available. Zero-day exploits are used by attackers before the software vendor knows about the vulnerability. ... The term derives from the age of the exploit. When a vendor becomes aware of a security hole, there is a race to close it before attackers discover it or the vulnerability becomes public. A "zero day" attack occurs on or before the first or "zeroth" day of vendor awareness, meaning the vendor has not had any opportunity to disseminate a security ... (view more)

Fri
01
Jun
Dennis Faas's picture

Vista Only Marginally More Secure Than XP, Research Suggests

Independent security tests performed by CRN.com suggests that Windows Vista is only marginally more secure than Windows XP. CRN spent a week testing both operating systems against various Trojans, viruses and various exploits. The tests were ... performed with Windows Vista Business on an HP Compaq 6515b notebook with Internet Explorer 7 (IE7) and an HP Compaq nc6400 with Windows XP with Internet Explorer 6 (IE6), both using the default security features and settings. Finjan's RUSafe sniffer tool (a security tool that sniffs live traffic and generates logs that can be analyzed to help protect you ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Subscribe to RSS - exploits