ATENTIONβΌ New - CVE-2013-4868
π Read
via "National Vulnerability Database".
Karotz API 12.07.19.00: Session Token Information Disclosureπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4867
π Read
via "National Vulnerability Database".
Electronic Arts Karotz Smart Rabbit 12.07.19.00 allows Python module hijackingπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4859
π Read
via "National Vulnerability Database".
INSTEON Hub 2242-222 lacks Web and API authenticationπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4796
π Read
via "National Vulnerability Database".
ReviewBoard 1.6.17 allows code execution by attaching PHP scripts to review requestπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4764
π Read
via "National Vulnerability Database".
Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4763
π Read
via "National Vulnerability Database".
Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4743
π Read
via "National Vulnerability Database".
Static HTTP Server 1.0 has a Local Overflowπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4692
π Read
via "National Vulnerability Database".
Xorbin Analog Flash Clock 1.0 extension for Joomia has XSSπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4621
π Read
via "National Vulnerability Database".
Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilitiesπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-0158
π Read
via "National Vulnerability Database".
thttpd 2007 has buffer underflow.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4980
π Read
via "National Vulnerability Database".
Multiple stack-based buffer overflows in CFProfile.exe in Toshiba ConfigFree Utility 8.0.38 allow user-assisted attackers to execute arbitrary code.π Read
via "National Vulnerability Database".
β 7 types of virus β a short glossary of contemporary cyberbadness β
π Read
via "Naked Security".
Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.π Read
via "Naked Security".
Naked Security
7 types of virus β a short glossary of contemporary cyberbadness
Hereβs a short list of 7 malware categories we hope you never encounter. Sadly, itβs not an exhaustive listβ¦ but itβs a helpful start.
π How to change the HTTP listening port in Apache π
π Read
via "Security on TechRepublic".
If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.π Read
via "Security on TechRepublic".
π΄ 6 CISO New Year's Resolutions for 2020 π΄
π Read
via "Dark Reading: ".
We asked chief information security officers how they plan to get their infosec departments in shape next year.π Read
via "Dark Reading: ".
Dark Reading
6 CISO New Year's Resolutions for 2020
We asked chief information security officers how they plan to get their infosec departments in shape next year.
β Monday review β the hot 12 stories of the week β
π Read
via "Naked Security".
From smartphone tracking to "climate change" malware, get up to date with everything we've written in the last week.π Read
via "Naked Security".
Naked Security
Monday review β the hot 12 stories of the week
From smartphone tracking to βclimate changeβ malware, get up to date with everything weβve written in the last week.
π How to change the HTTP listening port in Apache π
π Read
via "Security on TechRepublic".
If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.π Read
via "Security on TechRepublic".
TechRepublic
How to change the HTTP listening port in Apache
If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.
β Top Mobile Security Stories of 2019 β
π Read
via "Threatpost".
Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.π Read
via "Threatpost".
Threat Post
Top Mobile Security Stories of 2019
Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.
β Mean Time to Hardening: The Next-Gen Security Metric β
π Read
via "Threatpost".
Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.π Read
via "Threatpost".
Threat Post
Mean Time to Hardening: The Next-Gen Security Metric
Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.
π΄ Fraud in the New Decade π΄
π Read
via "Dark Reading: ".
Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growthπ Read
via "Dark Reading: ".
Darkreading
Fraud in the New Decade
Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth
π΄ How Can My Security Team Begin Future-Proofing for Quantum Computing? π΄
π Read
via "Dark Reading: ".
Knowing where your digital certificates are is just the start.π Read
via "Dark Reading: ".
Dark Reading
How Can My Security Team Begin Future-Proofing for Quantum Computing?
Knowing where your digital certificates are is just the start.