Hacking & Security

Update Adobe Reader app for Android to Patch Remote Code Execution Vulnerability

The Hacker News - 15 Duben, 2014 - 16:19
If you're one of the 400 million Android users out there who have installed Adobe Reader app that helps you to view PDF documents on mobile devices, then you should immediately update your app from Google Play Store. Adobe has released an updated Adobe Reader 11.2.0 version to addresses an important vulnerability that could be exploited to gain 'remote code execution' ability on the
Kategorie: Hacking & Security

Murdering Dexter

InfoSec Institute Resources - 15 Duben, 2014 - 15:57

In this article we are going to solve a Bot challenge. The name of the bot is Dexter and the vulnerable VM which we are going to use is created by Brian Wallace. The challenge is to gain root privileges of the bot command and control center and the system’s [...]

The post Murdering Dexter appeared first on InfoSec Institute.

Kategorie: Hacking & Security

Virtualization and Cloud Computing

InfoSec Institute Resources - 15 Duben, 2014 - 15:32

In cloud computing, there are a number of components used to build the cloud infrastructure. At the lowest layer there are actual hardware components like servers, network attached storage and network components. In order to limit the possibility of spreading an infection, networks need be properly separated into multiple DMZs [...]

The post Virtualization and Cloud Computing appeared first on InfoSec Institute.

Kategorie: Hacking & Security

Autor Chyby krvácejícího srdce se přiznal

Novinky.cz - bezpečnost - 15 Duben, 2014 - 15:32
Chybu do šifrovací knihovny Open SSL, známou jako Heartbleed (Chyba krvácejícího srdce), která ohrozila velkou část internetu, vnesl dobrovolný programátor Robin Seggelmann.


Kategorie: Hacking & Security

Google patches Android icon permissions attack

InfoWorld.com [Security] - 15 Duben, 2014 - 13:39

Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye. FireEye recently spotted an malicious Android application that could modify the icons of other applications so that when they're launched, they send victims to a phishing website.

The malware is abusing a set of permissions known as "com.android.launcher.permission.READ_SETTINGS" and "com.android.launcher.permission.WRITE_SETTINGS."

Kategorie: Hacking & Security

Google patches Android icon permissions attack

InfoWorld.com [Security] - 15 Duben, 2014 - 13:39

Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye. FireEye recently spotted an malicious Android application that could modify the icons of other applications so that when they're launched, they send victims to a phishing website.

The malware is abusing a set of permissions known as "com.android.launcher.permission.READ_SETTINGS" and "com.android.launcher.permission.WRITE_SETTINGS."

Kategorie: Hacking & Security

Google patches Android icon permissions attack

InfoWorld.com [Security] - 15 Duben, 2014 - 13:39

Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye. FireEye recently spotted an malicious Android application that could modify the icons of other applications so that when they're launched, they send victims to a phishing website.

The malware is abusing a set of permissions known as "com.android.launcher.permission.READ_SETTINGS" and "com.android.launcher.permission.WRITE_SETTINGS."

Kategorie: Hacking & Security

Google patches Android icon permissions attack

InfoWorld.com [Security] - 15 Duben, 2014 - 13:39

Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye. FireEye recently spotted an malicious Android application that could modify the icons of other applications so that when they're launched, they send victims to a phishing website.

The malware is abusing a set of permissions known as "com.android.launcher.permission.READ_SETTINGS" and "com.android.launcher.permission.WRITE_SETTINGS."

Kategorie: Hacking & Security

Netgear: NASy jsou bezpečné, ale raději kvůli Heartbleedu aktualizujte

Zive.cz - bezpečnost - 15 Duben, 2014 - 13:25
Po Ciscu a několika dalších výrobcích, kteří ve svých produktech používají šifrovací knihovnu OpenSSL, se ozval i jeden z předních výrobců síťových disků. Netgear prý zatím nezjistil, že by jeho NASy byly náchylné k útoku pomocí chyby Heartbleed, u některých nových modelů ale doporučuje ...
Kategorie: Hacking & Security

Google updates terms of service to reflect its scanning of users' emails

InfoWorld.com [Security] - 15 Duben, 2014 - 13:08

Google has updated its terms of service to reflect that it analyzes user content including emails to provide users tailored advertising, customized search results and other features.

The Internet giant's scanning of users' email has been controversial with privacy groups describing it as an intrusion into user privacy.

Kategorie: Hacking & Security

Google updates terms of service to reflect its scanning of users' emails

InfoWorld.com [Security] - 15 Duben, 2014 - 13:08

Google has updated its terms of service to reflect that it analyzes user content including emails to provide users tailored advertising, customized search results and other features.

The Internet giant's scanning of users' email has been controversial with privacy groups describing it as an intrusion into user privacy.

Kategorie: Hacking & Security

Google updates terms of service to reflect its scanning of users' emails

InfoWorld.com [Security] - 15 Duben, 2014 - 13:08

Google has updated its terms of service to reflect that it analyzes user content including emails to provide users tailored advertising, customized search results and other features.

The Internet giant's scanning of users' email has been controversial with privacy groups describing it as an intrusion into user privacy.

Kategorie: Hacking & Security

Google updates terms of service to reflect its scanning of users' emails

InfoWorld.com [Security] - 15 Duben, 2014 - 13:08

Google has updated its terms of service to reflect that it analyzes user content including emails to provide users tailored advertising, customized search results and other features.

The Internet giant's scanning of users' email has been controversial with privacy groups describing it as an intrusion into user privacy.

Kategorie: Hacking & Security

German Aerospace Center targeted by Self-Destructing Spyware

The Hacker News - 15 Duben, 2014 - 12:58
It’s not so far when Germany confirmed its biggest Data theft in the country's history with the usernames and passwords of some 18 million email accounts stolen and compromised by Hackers, and now German space research center has been reportedly targeted in a cyber attack. The new story broke by the German press, Der Spiegel on Sunday revealing that the German Aerospace Centre (DLR -
Kategorie: Hacking & Security

Google issues patch for Android icon permissions attack

Computerworld.com [Hacking News] - 15 Duben, 2014 - 12:28
Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye.
Kategorie: Hacking & Security

Notorious troll and hacker Weev has conviction overturned

Sophos Naked Security - 15 Duben, 2014 - 12:14
The courts have overturned Weev's conviction without having to deal with the sticky subject of the Computer Fraud and Abuse Act. They did it on grounds that surprised nobody: namely, venue.

Review: 8 secure browser alternatives to Chrome, IE, and Firefox

InfoWorld.com [Security] - 15 Duben, 2014 - 12:00

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness and secure the browsing channel itself?

Kategorie: Hacking & Security

Review: 8 secure browser alternatives to Chrome, IE, and Firefox

InfoWorld.com [Security] - 15 Duben, 2014 - 12:00

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness and secure the browsing channel itself?

Kategorie: Hacking & Security
Syndikovat obsah