Bash Bug

Reflections on Bash Bug case and evolution of IT security landscapeReflections on Bash Bug case and evolution of IT security landscape

Reflections on Bash Bug case and evolution of IT security landscape

Security expert Boris Mutina made an analysis of IT Security landscape, highlighting critical trends and suggesting a proactive approach to…

11 years ago
Romanian Hackers exploited Bash Bug flaw to hack Yahoo serversRomanian Hackers exploited Bash Bug flaw to hack Yahoo servers

Romanian Hackers exploited Bash Bug flaw to hack Yahoo servers

The security expert Jonathan Hall found evidence that a gang of Romanian Hackers exploited the Bash Bug flaw to hack…

11 years ago
Bash bug and risks posed by incomplete patches, discovered other two additional bugsBash bug and risks posed by incomplete patches, discovered other two additional bugs

Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell…

11 years ago
Apple released a patch for the Shellshock vulnerabilityApple released a patch for the Shellshock vulnerability

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion,…

11 years ago
ShellShock could be used to hack VoIP systemsShellShock could be used to hack VoIP systems

ShellShock could be used to hack VoIP systems

Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be  exploited to hack Voice over IP systems worldwide. The…

11 years ago
The majority Mac users safe from Bash Bug while Oracle warns its customersThe majority Mac users safe from Bash Bug while Oracle warns its customers

The majority Mac users safe from Bash Bug while Oracle warns its customers

Apple says users of its OS X are "safe by default" from the Bash Bug, meanwhile Oracle warns its customers…

11 years ago
Spike botnet runs DDoS attacks from IoT devicesSpike botnet runs DDoS attacks from IoT devices

Spike botnet runs DDoS attacks from IoT devices

Experts at Akamai spotted a new malware kit named Spike which is used by bad actors to run DDoS attacks…

11 years ago
Hackers target Bash Bug vulnerability in the wildHackers target Bash Bug vulnerability in the wild

Hackers target Bash Bug vulnerability in the wild

The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of…

11 years ago
Bash Bug is a critical risk to entire Internet infrastructureBash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is…

11 years ago