Article on the subject of "computer vulnerabilities"
-
More than 70,000 Memcached servers are still capable of being hacked remotely
nothing in this world is 100% safe, from the real world to cyberspace. the vulnerabilities are troublesome but worse than that, we didn't update the patches in time.
-
Eternal Blues - NSA's EternalBlue vulnerability testing tool
when eternalblue became a familiar name and made everyone nervous, erez created a tool to help you check if the computer has this vulnerability.
-
Critical error on Skype allows hackers to execute malicious code remotely
a serious flaw was discovered on microsoft's chat and call application, allowing hackers to remotely execute malicious code and cause system crashes.
-
WannaCry is a year old, EternalBlue is bigger than you think
today 12/5, commemorating the 1st anniversary of wannacry extortion's virulence broke out into a global 'pandemic'.
-
The CredSSP vulnerability in the RDP protocol affects all versions of Windows
a serious vulnerability just found on the credssp protocol affects all versions of windows, allowing attackers to exploit rdp and winrm to steal data or run malicious code.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
How to check if the computer has serious Windows 10 vulnerabilities
recently, the us national security agency (nsa) has detected a serious security hole on windows 10 and microsoft has also released a patch to fix it. bkav has also recently released a tool to help windows 10 users check if their computer has been patched for the nsacrypt flaw.
-
Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computer
hackers can take advantage of these two vulnerabilities to view the history of downloading or executing malware on a user's computer.
-
WannaCry is a year old, EternalBlue is bigger than you think
today 12/5, commemorating the 1st anniversary of wannacry extortion's virulence broke out into a global 'pandemic'.
-
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
microsoft security researchers announced that they discovered more than two dozen serious remote code execution (rce) vulnerabilities related to internet of things (iot) and operational technology (ot) devices being used. relatively popular use today.
-
Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
the research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
-
Intel's chip has eight new serious vulnerabilities
several weeks ago, google project zero security experts discovered eight new vulnerabilities in intel's chip design, which could directly lead to specter and meltdown, two vulnerabilities that negatively impacted performance. whole computer system.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
-
Safeguard against Shellshock security vulnerabilities
the main advice for computer users is to always check for the latest software updates as soon as possible.
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
this is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
Four Windows vulnerabilities can be exploited in the perfect attack chain
the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.
-
New worm attacks Windows
security experts have discovered a new dangerous virus, taking advantage of the latest vulnerabilities in windows to attack the system.
-
Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applications
international security researchers have recently developed a method, or rather, a rather dangerous new vulnerability on many popular web browsers.
-
Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
in the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.