vulnerable

Tue
07
Jun
John Lister's picture

New 'Pre-Hijacking' a Threat to User Accounts

Nearly half of all leading websites are vulnerable to an audacious hacking method according to a new report. The attacks involve hijacking an account before it has even been created. The scam uses various methods, but usually involves creating an ... account using an email address, then waiting for the actual owner of that email address to attempt to create an account on a specific website. Microsoft's Andrew Paverd and independent researcher Avinash Sudhodanan detailed the problems in a research paper and blog post. (Source: microsoft.com ) They say the "root cause" of the problem is that many ... (view more)

Fri
29
Jun
Dennis Faas's picture

How to Fix: VPNFilter Router Malware (And Test if Vulnerable)

Infopackets Reader Gord F. writes: " Dear Dennis, I have heard from the media and some friends that I should reboot my router due to Russian malware that is infecting routers. I have done some research on the subject and the story made headlines ... back around May 29, 2018, followed by more updates to suggest that the VPNFilter Router Malware is much worse than originally thought. I have checked and mine does not seem to be on the list of affected routers. What should I do now? " My response: From what I understand, the VPNFilter Router Malware affects routers made by Cisco and Linksys, MikroTik ... (view more)

Thu
03
Mar
John Lister's picture

New 'Drown' Bug: Millions of Secure Sites Could be at Risk

An estimated 11 million secure websites could be vulnerable to hackers exploiting a security bug. Amazingly, the bug has to do with technology that is over 20 years old. There's little, if anything website visitors can do as the bug needs fixing by ... site operators. However, it is possible to check if a site appears to be vulnerable. The bug has been dubbed Drown, a name rather tenuously derived from "Decrypting the RSA algorithm with Obsolete and Weakened eNcryption." Researchers who uncovered the bug aren't publishing the precise details. At the moment it's not known if ... (view more)

Wed
12
Mar
Brandon Dimmel's picture

Latest Patch Tuesday Underscores Windows XP Demise

Microsoft's latest Patch Tuesday release fixes several security vulnerabilities currently marked "critical" -- the firm's highest security rating. Microsoft's Patch Tuesday fixes are always rolled out starting the second Tuesday of each month, but ... sometimes take longer to reach consumers depending on Internet availability. This month's Patch Tuesday includes five security updates, two of which have been marked critical. One of those critical fixes addresses a vulnerability in Internet Explorer, Microsoft's web browser. This month's updates are particularly ... (view more)

Wed
24
Apr
Dennis Faas's picture

Microsoft: Shocking Number of PCs Vulnerable

Microsoft says that approximately one in four computers around the world are completely vulnerable to cyber attack. That finding is one part of Microsoft's newest Security Intelligence Report. According to the fourteenth volume of Microsoft's ... Security Intelligence Report, 24 per cent of all computers worldwide are not protected by up-to-date antivirus or anti-malware software. The problem with that, Microsoft says: "Computers without antivirus software are 5.5 times more likely to be infected." (Source: digitaltrends.com ) Microsoft's report also highlights the dangers posed to computers ... (view more)

Mon
22
Apr
Dennis Faas's picture

Many Home Routers Vulnerable to Attack: Report

Do you use a Linksys, Netgear, Verizon, D-Link, or Belkin router for your home network? Then your network could be vulnerable to attack. Baltimore, Maryland-based security consultancy firm Independent Security Evaluators (ISE) says that in a test of ... popular home routers most were vulnerable to attack by hackers. ISE put routers from Linksys, Netgear, Verizon, D-Link, and Belkin to the test after having installed each firm's latest firmware updates. ISE also left each router's default configurations in place when carrying out their tests. Hackers Intercept Sensitive Information ISE found that ... (view more)

Mon
28
Jan
Dennis Faas's picture

Printer Networks Vulnerable to Hackers: Report

Printers using server software offered by Hewlett-Packard (HP) are reportedly vulnerable to attack. In fact, it's possible for a hacker to use the flaw to bypass security defenses, steal documents, and crash every machine connected to the same ... network. Security researcher Sebastian Guerrero says the problem affects printers using HP's JetDirect software. That software is used for print servers, meaning it can handle any printing request made by a network-connected computer. Hackers Could Bypass Security Defenses Guerrero says that a flaw in the JetDirect software could allow an attacker to ... (view more)

Mon
16
Mar
Dennis Faas's picture

Global Warming Could Bring Hurricanes to Northeast

Research suggests that global warming could have a significant impact as sea levels continue to rise. True, it was hard to tell last month that global warming was ever a problem. However, it is having an impact, even if we haven't yet seen any 70 ... degree Fahrenheit January mornings. Instead, the effect could drastically change what a summer is like in New York City and the rest of the heavily-populated Northeast and it won't necessarily be limited to temperature -- it could have a direct impact on all weather in this part of the country. Among the Most Vulnerable Regions According to Florida ... (view more)

Fri
02
Mar
Dennis Faas's picture

SupportSoft Tech Support Tools Leave PCs Vulnerable to Remote Attack

The United States Emergency Readiness Team (US-CERT) has issued an advisory regarding remote tech support tools made by SupportSoft. The affected software uses ActiveX controls contain multiple buffer overflow vulnerabilities which could allow a ... remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The SupportSoft ActiveX controls are essentially small applications that can be run from Microsoft's Internet Explorer. The affected software is often used by Internet service providers, PC makers and other companies to provide support functions such as remote ... (view more)

Subscribe to RSS - vulnerable