An attacker who knows how to update the firmware – not a tough task, says security researcher Billy Rios – can change the dosage to a lethal limit. Source: Sophos
An attacker who knows how to update the firmware – not a tough task, says security researcher Billy Rios – can change the dosage to a lethal limit. Source: Sophos
Duqu 2.0: Frequently Asked QuestionsDuqu 2.0 Technical Paper (PDF)Indicators of Compromise (IOC)Yara rulesPress release Earlier this year, during a security sweep, Kaspersky Lab detected a cyber-intrusion affecting several of our internal systems. Following this finding, we launched a large scale investigation, which led to the discovery of a new malware platform from one of the […]
Adobe today released software updates to plug at least 13 security holes in its Flash Player software. Separately, Microsoft pushed out fixes for at least three dozen flaws in Windows and associated software. The bulk of the flaws Microsoft addressed today (23 of them) reside in the Internet Explorer Web browser. Microsoft also issued fixes […]
You are rarely separate from the device which is with you day and night. Sending it to the technical service because it has been giving you problems for the last few weeks, giving it away because you want to buy the next model or giving it a second life by recycling it or donating it […]
Panda Security today announced the launch of Panda Adaptive Defense, a cloud-based solution that ensures endpoint protection against Advanced Persistent Threats (APTs), the ransomware trojan CryptoLocker, and targeted attacks in enterprise environments. Adaptive Defense offers a disruptive approach compared to traditional blacklist-, whitelist- and sandbox-based approaches. Adaptive Defense also detected the recently publicized “Phantom Menace” […]
Microsoft releases eight security bulletins today, updating a set of forty five software vulnerabilities. This month’s updates touch a smaller set of Microsoft software, but two of the Bulletins address kernel-level vulnerabilities and require a restart. Some are being exploited as a part of serious targeted attack activity: Windows Kernel, win32k.sys (MS15-061) Internet Explorer – critical Windows […]
Last week, KrebsOnSecurity ran an interview with Julie Magee, Alabama’s chief tax administrator, to examine what the states are doing in tandem with the IRS and others to make it harder for ID thieves to commit tax refund fraud — a $6 billion a year problem. Today we’ll hear from John Valentine, chair of Utah’s […]
One more, there have been so many, we’ve lost track! WhatsApp Trendy Blue is the last hoax to deceive the users of this instant messaging application. WhatsApp Trendy Blue, the new “version” that promises new options to customize the users’ WhatsApp. In fact, it is only subscribing the user to a premium rate service, which it is […]
What is your mother’s name? And your favorite color? We don’t want to interrogate you, these are the security questions we have to answer in order to recover our password or as an extra step during the identification process. If we have forgotten our password, after failing all attempts to entering it correctly, the platform […]