A security advisory recently released by CISCO announce that three Cisco wireless kits are affected by a critical bug, but no fix is available at the moment. SOHO devices are among most targeted network components in the wild, they are often poorly protected or not properly configured exposing users to serious risks. In these cases, […]
The Government of Singapore will cut off civil servants’ work computers from the Internet in order to secure Government networks. The Singapore’s prime Minister Lee Hsien Loong confirmed this week that the Government would disconnect from the Internet government work stations within a year for security reasons. The measure was aimed at preventing cyber attacks that […]
Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites The security experts Vulnerability Lab CEO Benjamin Kunz Mejri and Marco Onorati have discovered a number of SQL injection vulnerabilities in the websites of the European Parliament and the European Commission. The exploitation of the flaws in […]
EMC Data Domain OS and VMware NSX and vRealize are affected by security issues that could be exploited to gain unauthorized access to data. Both EMC and VMware are affected by security issues that could allow unauthorized access to attackers. An information disclosure vulnerability in the EMC Data Domain OS could potentially be exploited by malicious users […]
A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow in the Chrome PDF reader. The security expert Aleksandar Nikolic from the Cisco Talos group has discovered an arbitrary code execution vulnerability (CVE-2016-1681) in PDFium, which is the PDF reader component installed by default in Google Chrome […]
China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications. Satellites have a crucial role in our digital society, almost every industry is benefiting from their services for this reason their security is a pillar of the cyber security strategy of governments worldwide. Attackers are posing […]
The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s a buzzword that has been around the past decade and has often been portrayed in futuristic visions of a society where man and technology has integrated into one. The potential of IoT devices connected over cloud […]
Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time attacks. A team of researchers from the University of Michigan recently released a paper describing how computer processors can be programmed to give elevated privileges to hackers. The paper titled, “A2: Analog Malicious Hardware,” describes […]
A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code execution. Once again bad news for Lenovo users, the company is informing them that the Lenovo Accelerator Application contains a high-risk vulnerability that could be exploited by hackers to remotely execute code on the machine and […]
Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related to the Iranian citizens. The Iranian Government spends a significant effort for the Internet monitoring and control, its activities often lead to a concrete censorship. Last year the Government of Teheran has blocked Telegram and many other social networking companies due to […]