Stuxnet Is Still The Popular Vulnerability Used By Hackers

The critical vulnerability CVE-2010-2568 affects Microsoft Windows products and allows attackers to compromise the vulnerable system. This can be exploited via a specially crafted shortcut to execute arbitrary code on the system. Typically, the malware Stuxnet was identified as a Win32 / CplLnk family representative. However, they were recorded, and the vulnerability affects the versions of Windows 8 and above. The most popular family of malware was Win32 / Gamarue, one of the largest and oldest botnets....

May 11, 2016 · 1 min · 90 words · Christopher Haley

WhatsApp Introduced Desktop Apps For Windows And Mac

As we all know, WhatsApp Messenger is an American proprietary cross-platform instant messaging client for smartphones. Recently, the Facebook-owned company WhatsApp launched a desktop program for Windows and Mac. Hence, the Facebook-owned company WhatsApp also promised not to show third-party ads to compensate for the revenue shortfall. Hence, the company is ramping up its service and introducing many new features. If you want to download the WhatsApp desktop client, visit WhatsApps official site....

May 11, 2016 · 1 min · 73 words · Gregory Huynh

Airtel Decided To launch Cloud Platform Together With Microsoft

Hence, the telecom providers portfolio also includes several services for businesses. Our partnership with Airtel, the third-largest global carrier, is a major step in this direction. We hope to bring an integrated and seamless experience for our mutual customers.

May 10, 2016 · 1 min · 39 words · Valerie Martinez

Now Hackers Can Imitate Victims And Can Reply To WhatsApp Chats

Hence, both messaging services claim to offer end-to-end encryption for chats.

May 10, 2016 · 1 min · 11 words · Christopher Cameron

How to Stop Wifi Stealing and Catch that Wifi Hacker

This means that it requires some permissions which can be used to gain access to the internet service. Most people are focused on hacking the wifi networks for gaining access to the internet service. Many persons have been targeted by hackers by breaking into their WiFi web link. you might stop them from breaking into your WiFi internet too. Press those options to know how many devices are connected to your Wifi....

May 9, 2016 · 1 min · 136 words · Ashley Lee

Lenovo Fixed A Dangerous Vulnerability In Lenovo Solution Center

The tech giant Lenovo has corrected a dangerous vulnerability in its software tool Lenovo Solution Center (LSC). The problem was fixed in version Lenovo Solution Center (LSC) 3.3.002. Lenovo has not released a new notification about the problem but simply updated the existing one. For the others, they have to plant the update manually. As we mentioned earlier, the users can simply download the patch from the official website of Lenovo....

May 9, 2016 · 1 min · 71 words · James Smith

Trojan-Extortionist CyptMix Demands Money To Help Children

This new strain of malware is spread through spam emails and drive-by attacks. However, it is the first time that experts have seen this kind of Psychological manipulation in ransomware-based attacks. Still, most likely, the loud statements are the only way to the psychological impact on the victim. So that means that You will get a participation in this process too. Many children will receive presents and medical help! And We trust that you are a kind and honest person!...

May 9, 2016 · 1 min · 144 words · Carrie Wright

Twitter Prohibits US intelligence To Use Analysis Service

The tech giant Twitter has decided to ban the US intelligence agencies access to a plain mail service published on its agencies, used in the fight against terrorism. A talk about new example of the tensions between Silicon Valley companies and the federal government is on privacy, according to the Wall Street Journal. Twitter Prohibits US intelligence To Use Analysis Service The decision was not publicly announced, which was confirmed to the media by an intelligence official and other people also aware of the facts....

May 9, 2016 · 2 min · 371 words · Elaine Morales

Vulnerabilities In Samsung SmartThings Allow Hackers To Break Into The House

Samsung SmartThings is one of the leading online platforms to connect smart devices. The researchers also developed POC attacks demonstrating how they could disable vacation mode and induce a fake fire alarm. According to the security team, We found two forms of over privilege for SmartThings. First, coarse-grained capabilities lead to over 55% of existing SmartApps to be overprivileged. Second, coarse SmartApp-SmartDevice binding leads to SmartApps gaining access to operations they did not explicitly ask for....

May 6, 2016 · 1 min · 128 words · Ashley West

World’s First Worm For Programmable Controllers Distributed Without PC

According to the researchers, their worm spreads like cancer between Siemens S7 PLC 1200. However, it can be recycled by the other controllers. You almost can not find it, and it (the worm Ed.) Quickly spread throughout the enterprise connection. We can cause a denial of service and bring the PLC fails. Imagine the consequences if this happens at a critical enterprise infrastructure.

May 6, 2016 · 1 min · 63 words · Rebecca Smith

Google Fixed 40 Vulnerabilities In Android

But, With the help of the Qualcomm Tethering Controller (CVE-2016-2060), the vulnerability can expose. The remaining vulnerabilities are marked as medium risk.

May 5, 2016 · 1 min · 22 words · Mariah Fisher

OpenSSL Fixed Six Severe Flaws

Hence, these flaws can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. OpenSSL Fixed Six Severe Flaws Under certain conditions, an attacker can execute irrational code remotely. The flaw, CVE-2016-2105, and CVE-2016-2106 affect the EVP_EncodeUpdate function. As reported in the security bulletin, the chances of the remotely executed code are very small. The vulnerability CVE-2016-2109 can cause large amounts of memory distribution, leading to over-consumption of resources or memory overflow....

May 5, 2016 · 1 min · 84 words · Katie Clark

A Software Error Destructed The Japanese Satellite

Japanese astronomical satellite Hitomi was lost after the collapse of orbiting during an uncontrolled rotation. Data were transferred shortly after the separation of the tool from the back of the probe satellite. This fact is important for two reasons. First, the Japanese astronomical satellite Hitomi was on the other side of the Earth from Japan. Hence, there was no active monitoring from the ground situation. This can lead to disruption of the onboard electronics....

May 4, 2016 · 1 min · 119 words · Miguel Melton DVM