Archives: June 2018
You are here: Home \ 2018 \ June \ Page 5
One of the most serious issues is a critical remote code execution vulnerability in the Windows DNS, which could allow an attacker to take full control of the targeted machine.
Vendors have been shipping Android products with Android Debug Bridge enabled, making them attractive targets for hackers.
Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.
The operation also resulted in the seizure of nearly $2.4 million and the recovery of about $14 million in fraudulent wire transfers, said the FBI.
Researchers found three vulnerabilities in Foscam connected security cameras that could enable a bad actor to gain root access knowing only the camera’s IP address.
With a nest full of spy capabilities and good hiding techniques, the InvisiMole was able to tunnel under the radar for at least five years.”
The stolen data included “secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020,” American officials said.
Researchers found that a critical Weight Watchers server revealed its IT internal infrastructure.
Lenovo patches several popular tablet models to protect against BlueBorne vulnerabilities first identified in September 2017.
The ability of these simple files to open Excel and download any data from the internet makes them extremely dangerous.