Article on the subject of "vulnerabilities"
-
Enhance security with multi-layer defense system
one concern now is that the number of annual security threats increases dramatically, and above all, current security threats are constantly changing, developing and morphing. .
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
New worm attacks attack dangerous Windows errors
in the end, a security vulnerability worm that microsoft had blocked with an emergency update 11 days ago appeared on the internet.
-
The new worm 'digs' a Windows vulnerability
a new worm with the name win32 / conficker.a is spreading quite strongly in the network of computers that install windows operating systems
-
The biggest security hole in 2018
2018 is a year of headache for global it professionals.
-
The jailbreak method for iPad is ready
after 'unlocking', the ipad can customize the screen background image and access and install different applications.
-
Warning about serious vulnerabilities in SQL Server
systems running sql server 2000, sql server 2005, sql server 2005 express edition, sql server 2000 desktop engine (msde 2000), ... can be exploited and controlled
-
Twitter was cut down by 17-year-old hacker
in just two weekends, twitter's 'microblogging' was knocked down twice by a young man living in brooklyn. the boy said he did so to alert twitter to patch the vulnerability
-
How to fix 'dead screen black' error
updated patches sometimes cause a more annoying error. security vendor prevx announced a black screen error when windows users updated a patch from microsoft. however, the big man completely denied information from prevx.
-
Microsoft has just released the 2007 Outlook 2007 update
last week, microsoft removed an update for outlook 2007 that was released just two days earlier. the cause of this unusual move is due to performance and connectivity issues.
-
Detecting new malware on WinRAR can infiltrate computers and steal data
researchers have discovered a new type of malicious code that could take advantage of the security bug on winrar decompression software to hijack and hijack computers to steal data.
-
Google announced a serious vulnerability in the macOS kernel
this vulnerability is located in macos xnu (kernel) kernel, if it successfully exploits it, malicious hackers or programs can manipulate the file system without informing the operating system.
-
Warning: Dangerous security holes in Wordpress platform, hackers can take advantage to take control of the website
according to the experts at cystack network security company, a dangerous vulnerability exists in the deleting function of all versions of wordpress, a popular website building platform.
-
Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applications
apps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
-
Critical vulnerabilities discovered in Framework Electron, Skype, Slack, Twitch and a series of affected apps
the framework of a variety of popular desktop applications such as skype, slack, signal, twitch ... appears a serious security hole. it is important that this vulnerability only affects windows.
-
Microsoft rushed to release security updates for Windows XP, Server 2003
if you are still using a copy of windows xp or windows server 2003 on networked systems (and both windows 7, windows server 2008 and 2008 r2), pay attention!
-
Hacker earned $ 32,000 in 7 weeks by fixing a series of gaps in e-money projects
over the past 7 weeks, white-hat hackers around the world have earned at least $ 32,150 through the successful fix of a series of security flaws that appear on popular electronic and blockchain platforms like tron, brave, eos and coinbase.
-
The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotely
watch! if you are constantly using uc browser as the main browser on your smartphone, now is the time to carefully consider uninstalling it immediately.
-
Google: Play Protect helped cut 20% of malicious Android application installations by 2018
to reschedule, google recently officially announced the security & privacy year in review report periodically. basically, this is an overall report that details how mountain view giants have made it more secure for more than 2 billion android devices worldwide.
-
Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computer
hackers can take advantage of these two vulnerabilities to view the history of downloading or executing malware on a user's computer.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
microsoft security researchers announced that they discovered more than two dozen serious remote code execution (rce) vulnerabilities related to internet of things (iot) and operational technology (ot) devices being used. relatively popular use today.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
Four Windows vulnerabilities can be exploited in the perfect attack chain
the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.
-
Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
the research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
-
Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applications
international security researchers have recently developed a method, or rather, a rather dangerous new vulnerability on many popular web browsers.
-
Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
in the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.
-
Intel's chip has eight new serious vulnerabilities
several weeks ago, google project zero security experts discovered eight new vulnerabilities in intel's chip design, which could directly lead to specter and meltdown, two vulnerabilities that negatively impacted performance. whole computer system.
-
Foreshadow - the fifth most serious security hole in the CPU in 2018
this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
-
5 common errors in managing security vulnerabilities
in the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
-
Find security holes on every site with Nikto
there are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
-
Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applications
apps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
-
Detects 'long-standing' security vulnerabilities in Microsoft Office
security firm bkav on july 22 has warned that a microsoft office vulnerability has been quietly exploited since 2009.
-
If you hack HP's printer, you will receive $ 10,000
hp is offering a printer-specific vulnerability program, whereby any researcher who discovers vulnerabilities that allow hackers to take control of the company's printer will be rewarded with $ 10,000.