Wednesday, February 22, 2017
Home Tags Byte

Tag: Byte

KopiLuwak: A New JavaScript Payload from Turla

On 28 January 2017, John Lambert of Microsoft (@JohnLaTwC) tweeted about a malicious document that dropped a “very interesting .JS backdoor“.Since the end of...

Firefox 51 Begins Warning Users of Insecure HTTP Connections

Mozilla Foundation took steps with the release of Firefox 51 on Tuesday to communicate more clearly to users when they land on a HTTP...

Insane blackhats behind world’s most expensive ransomware ‘forget’ to backup crypto...

Only Linux victims can decrypt warped $247,000 BlackEnergy module - and then only maybe Variants of the KillDisk data wiping malware, famous for nuking computers...

RHSA-2017:0002-1: Important: rh-nodejs4-nodejs and rh-nodejs4-http-parser security update

An update for rh-nodejs4-nodejs and rh-nodejs4-http-parser is now available forRed Hat Software Collections.Red Hat Product Security has rated this update as having a security...

Steganos Safe 18

Having your laptop stolen is traumatic; having the thief gain access to your sensitive documents could be catastrophic.To avert the possibility of catastrophe, use...

IoT camera crew Titathink tells Reg it’ll patch GET bug in...

Apologises for 'serious mistake' in older kit, says latest things are secure Titathink has become the second vendor to respond to the modified firmware that...

GET pwned: Web CCTV cams can be hijacked by single HTTP...

Server buffer overflow equals remote control An insecure web server embedded in more than 35 models of internet-connected CCTV cameras leaves countless devices wide open...

Telegram API ransomware wrecked three weeks after launch

Crypto so bad that getting around it is shooting fish in a barrel Ransomware scum abusing the protocol of the popular Telegram encrypted chat app...

The first cryptor to exploit Telegram

Earlier this month, we discovered a piece of encryption malware targeting Russian users. One of its peculiarities was that it uses Telegram Messenger’s communication...

Stupid encryption mistakes criminals make

Writing secure code can be challenging, and implementing cryptography correctly in software is just plain hard.Even experienced developers can get tripped up.And if your...

Reading this? Then you can pop root shells on Markvision enterprises

Twin bug bombs perish with patch Lexmark has patched two dangerous vulnerability in its Markvision enterprise IT analysis platform that grants remote attackers god-mode system...