Article on the subject of "security vulnerabilities"
-
Reveal personal data of more than 1.3 million people from a vulnerability in web application
georgia tech (georgia institute of technology) - one of the largest us education institutions, has announced the discovery of a serious data breach targeting its system, affecting nearly 1.3 million people.
-
Danger: Hackers can target medical devices, change medical examination and treatment results
hackers can completely infect malicious code on many medical devices such as computerized tomography (ct), magnetic resonance imaging (mri) to manipulate and modify medical examination results.
-
KB4482887 update patched the Specter vulnerability, but it caused problems for some Windows 10 games
code cumulative update kb4482887 for windows 10 1809 builds released a few days ago is causing a series of negative issues related to graphics processing performance in many different games.
-
Intel has overcome serious vulnerabilities in graphics drivers for Windows
intel recently announced that it has successfully overcome 20 security vulnerabilities in intel graphics driver for windows.
-
Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computers
if you're a counter-strike player, be careful.
-
Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
a code execution vulnerability in winrar has been exploited more than 100 times separately by hackers in the first week since it was revealed, and it is expected that this number will continue to increase in the future.
-
MySQL vulnerabilities allow malicious servers to steal data from customers
someone can take advantage of this problem to steal sensitive data from an improperly configured web server, allowing connection to untrusted servers or from database management applications. .
-
IBM developed a new technology to patch security holes
top security researchers at ibm have recently developed a new technique to etch almost entirely the impact of security vulnerabilities before they are actually found.
-
Foreshadow - the fifth most serious security hole in the CPU in 2018
this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
-
Vulnerabilities in Android allow malware to read device information even without permission
a vulnerability in android allows poisoned applications to pass the request to allow the right to read device information, thereby 'peeking out' more information than allowed, including the ability to help it track equipment location.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.
-
The Internet is experiencing a huge problem with C / C ++, causing developers to 'sweat'
an error affects the iphone, another error affecting windows and the third bug affects servers running linux - the total attack of a certain 'dark army'?
-
Warning: Detecting more than 1000 Cisco router and switch devices in Vietnam has a serious security error
there are more than 1000 cisco router and switch devices in vietnam (all devices used in large network environments and core systems) are subject to serious security errors.
-
Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
a serious flaw in the bittorrent application of transmission was discovered by tavis ormandy, a leading security expert at google. if successfully exploited, hackers can take full control of computers running linux or windows.
-
The risk of losing all passwords is due to the built-in password management tool on Windows 10
an attacker can use keeper to steal all the passwords stored here.
-
Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
on christmas day, a vulnerability affecting web servers was embedded with hundreds of thousands of iot devices, namely goahead, a web server created by embedthis software.
-
Errors on mobile applications allow hackers to control LG devices
lg electronics tried to avoid a security disaster when working with researchers to patch vulnerabilities in mobile applications that customers use to control lg smart home devices.
-
Apple updated the password revealing patch from the Disk Utility function
apple has just released an emergency update for macos high sierra to fix errors that expose passwords that are encrypted in apfs format via password hint feature.
-
Critical error on Apache Struts2 allows hackers to take over the web server
new researchers have discovered a remote code execution flaw in the apache struts open source web application framework, allowing an attacker to run malicious code on the server.
-
IBM developed a new technology to patch security holes
top security researchers at ibm have recently developed a new technique to etch almost entirely the impact of security vulnerabilities before they are actually found.
-
Find security holes on every site with Nikto
there are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
-
9 misconceptions about security and how to resolve
almost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
The NSA identifies 4 'critical' security vulnerabilities of cloud systems
the us national security agency (nsa) has issued a new guide to help organizations and businesses improve the security of data stored on the cloud.
-
5 common errors in managing security vulnerabilities
in the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
-
How to scan websites for potential security vulnerabilities with Vega on Kali Linux
resisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
6 enterprise security holes to note
here are six security vulnerabilities that are often expanded, even companies that are proud of their security precautions.
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
in the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.
-
Immediately fix critical vulnerabilities in Windows NTLM security protocol
researchers on firewall preempt behavior have discovered two new vulnerabilities in windows ntlm security protocols. let's see what those holes are and how serious it is!
-
Foreshadow - the fifth most serious security hole in the CPU in 2018
this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
-
Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applications
international security researchers have recently developed a method, or rather, a rather dangerous new vulnerability on many popular web browsers.
-
How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
to fix the bluekeep security vulnerability, users need to disable rdp and block port 3389
-
Learn about what a security vulnerability is.
security vulnerabilities are weaknesses that cybercriminals can exploit to steal user information and gain unauthorized access to computer systems. to learn more about what security vulnerabilities are, readers can refer to the article below from tipsmake.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
16 new security vulnerabilities can cause systems using Microsoft software to be attacked
in addition to warnings about security vulnerabilities in pan-os being used to attack systems, in april, the department of information security (ministry of information and communications) also recommended that units pay attention to 16 high-impact vulnerabilities. , serious in microsoft products.
-
Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applications
apps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
-
Safeguard against Shellshock security vulnerabilities
the main advice for computer users is to always check for the latest software updates as soon as possible.