A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars. Modern cars are complex systems composed of several components interconnected by internal networks, each system within these architectures is exposed to the risk of cyber attacks. Recently the German carmaker BMW has fixed a security […]
PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting servers. The critical GHOST vulnerability (CVE-2015-0235) in the GNU C library (glibc) may have a greater impact than imagined, security experts have discovered that PHP applications, including the popular WordPress Content Management System (CMS), could also […]
Mozilla products including the Firefox browser will stop trusting SSL certificates that were issued using old root CA certificates with 1024-bit RSA keys. Mozilla products including the popular Firefox browser will stop trusting SSL certificates that were issued using old root CA certificates with 1024-bit RSA keys. With this decision Mozilla wants to stress certificate authorities (CAs) […]
Experts at Bitdefender have discovered a spam campaign that tricks antispam filters by relying on macros in Empty Word Documents. Security experts at BitDefender observed a new tactic adopted by spammers that rely on emails with an empty Word document in the attachment to bypass anti-spam filters. The social engineering strategy adopted by spammers to lure victims into […]
According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security risks to Desktop machines in the US. According to the a new report published by Secunia security vendor, Oracle Java software represents the principal source of problems for private US desktops, followed by Apple Quicktime 7.x. Oracle Java is […]
The Linux GNU C Library (glibc) versions prior to 2.18 are affected by the GHOST remote code execution vulnerability present in the ‘gethostbyname’ function. A new critical vulnerability is threatening the Linux community, the flaw affects the glibc GNU C library. The vulnerability is present in all Linux systems dating back to 2000 and could […]
The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]
Adobe released a security update that fixes also the zero-day vulnerability CVE-2015-0311 discovered by Kafeine in the last release of Angler exploit kit. The French security expert Kafeine has recently discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit Kit. The new variant of the Angler exploit kit that exploit […]
SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common […]
Rapid7 revealed that more than 5000 Automated tank gauges (ATGs) used to prevent fuel leaks at gas stations in US are vulnerable to remote cyber attacks. A recent research conducted by HD Moore of Rapid7 revealed a disconcerting truth, the Automated tank gauges (ATGs) used to prevent fuel leaks at more than 5,000 gas stations in […]