Linux

Linux security flaw Android users at risk

Cyber security startup Perception Point revealed this week that as many as two thirds of Android users are running outdated software prone to be easily hacked. An potential attacker is granted root level privileges of an infected device using malware that targets a vulnerability in the Linux kernel. While exploit has yet to be used, [...]

By | January 19th, 2016|Uncategorized|0 Comments

Security flaw exposed in Adobe flash player

Researchers at Trend Micro have uncovered a flaw in all versions of Adobe flash player that put Linux, Mac and Windows users in jeopardy alike. The vulnerability was discovered after a recent attack by the hacker coalition known as Pawn Storm. Trend Micro claims the exploit could allow attackers to gain complete control of an [...]

By | October 15th, 2015|Uncategorized|0 Comments

Flash Player Zero-day exploit, patch immediately!

Flash Player 0-day exploited in the wild, patch immediately! Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total system compromise. "Adobe is aware of reports that CVE-2015-3113 is being actively exploited in the wild via limited, targeted attacks. [...]

By | June 24th, 2015|Uncategorized|0 Comments

How to protect from the Shellshock Bash bug

A worrying new security vulnerability has muscled its way onto the Internet, and world-leading security experts are saying it's even worse than this year's Heartbleed fiasco. Called "Bash" or "Shellshock", the security flaw is inherent to a computer's shell. This is the user interface that accesses operating systems like Command Prompt, and means that many [...]

By | September 27th, 2014|Uncategorized|0 Comments

Bash or Shellshock bug

A new security vulnerability known as the Bash or Shellshock bug could spell disaster for major digital companies, small-scale Web hosts and even Internet-connected devices. The quarter-century-old security flaw allows malicious code execution within the bash shell (commonly accessed through Command Prompt on PC or Mac's Terminal application) to take over an operating system and [...]

By | September 25th, 2014|Uncategorized|0 Comments