1-888-595-0672[email protected]

Blog

Ransomware: Malicious Software To Be Aware Of

Ransomware has become an issue since the beginning of 2016. It is an intrusive software that has been infecting computer systems of individuals and businesses alike. An Alert has been released by both the United Stated Department of Homeland Security and Canadian Cyber Incident Response Centre to provide more information about it. Click here to read all about it.

Department of Homeland Security. “Alert (TA16-091A).” Ransomware and Recent Variants. US-CERT – Department of Homeland Security., 31 Mar. 2016. (Revised: 11 Jul. 2016). Web. 13 July 2016. <https://www.us-cert.gov/ncas/alerts/TA16-091A>.

Read More
Vulnerability in Symantec

Symantec, an anti-virus software, contains a vulnerability which allows attackers to control affected computers remotely. Click here for more information.

Medhora, Narottam. “U.S. Agency Warns of Security Bug in Symantec’s Anti-virus Software.” Reuters. Ed. Anil D’Silva. Reuters, 05 July 2016. Web. 07 July 2016. <http://in.reuters.com/article/cyber-symantec-idINKCN0ZL2AW>.

Read More
Adobe having a bad week?

Adobe having a bad week? It had over 35 unspecified vulnerabilities in just a week. Check it out at https://www.us-cert.gov/ncas/bulletins/SB16-172

Read More
Microsoft to buy LinkedIn for $26 Billion

Some are calling the recent news of Microsoft buying LinkedIn for $26 billion as the largest acquisition in its history. The deal is a new approach to open new doors for both Microsoft and LinkedIn. LinkedIn could use this new boost as it had 117 million credentials leaked in May of this year. Find out how Microsoft intends to ensure tighter password security for LinkedIn.

Steele, Anne. “Microsoft to Acquire LinkedIn for $26.2 Billion.” WSJ. Dow Jones & Company, Inc., 14 June 2016. Web. 14 June 2016.

Tung, Liam. “After LinkedIn Heist, Here’s How Microsoft Is Tightening Password Security | ZDNet.” ZDNet. CBS Interactive, 25 May 2016. Web. 14 June 2016.

Read More
Vulnerability in Android

Before versions 5.1.1 LMY49F and 6.0 before 2016-01-01 in Android, the MediaTek misc-sd driver allows attackers to gain privileges via a crafted application aka internal bug 25307013. Please review CVE-2015-6637 for more information.

CVE-2015-6637US-Cert. Department of Homeland Security, 7 Jan. 2016. Web. 14 Jan. 2016.

Read More
Vulnerability in Apple TV

The kernel in Apple iOS version prior to 9.2 and watchOS version before 2.1 allows local users to gain privileges or cause a memory corruption via unspecified vectors.

“Bulletin (CVE-2015-7083).” US-Cert. Department of Homeland Security, 11 Dec. 2015. Web. 14 Dec. 2015.

Read More
Vulnerability Found in Samsung Galaxy S6

In the face recognition library in android.media.process, the media scanning functionality in Samsung Galaxy S6 Edge allows remote attackers to gain privileges or cause memory corruption via a crafted BMP image file.

“Bulletin (CVE-2015-7897).” US-CERT. Department of Homeland Security, 16 Nov. 2015. Web. 26 Nov. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-327>.

Read More
Vulnerability in WordPress

A SQL injection vulnerability in the “wp_untrash_post_comments” function in wp-includes/post.php in versions prior to 4.2.4 allows remote attackers to execute arbitrary SQL commands via a comment that is mishandled after retrieval from the trash.

“Bulletin (CVE-2015-2213).” US-CERT. Department of Homeland Security, 09 Nov. 2015. Web. 17 Nov. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-320>.

Read More
Vulnerability in Adobe Acrobat

Adobe Reader and Acrobat versions prior to 10 and 11, Acrobat and Acrobat Reader DC Classic before version 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before version 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

“Bulletin (CVE-2015-7650).” US-CERT. Department of Homeland Security, 3 Nov. 2015. Web. 09 Nov. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-313>.

Read More
Vulnerability in iPhone

A GasGauge vulnerability in Apple iOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a memory corruption.

“Bulletin (CVE-2015-6979).” US-CERT. Department of Homeland Security, 23 Oct. 2015. Web. 27 Oct. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-299>.

Read More