Home Tags Corruption

Tag: Corruption

IT threat evolution Q1 2017

Wersquo;ve become accustomed to seeing a steady stream of security breaches month after month; and this quarter has been no exception, including attacks on Barts Health Trust, Sports Direct, Intercontinental Hotels Group and ABTA.

Galaxy S8 review: Gorgeous new hardware, same Samsung gimmicks

First flagship since the Note 7 mess doesn't always put its best foot forward.

Security Analyst Summit 2017 Day One Recap

Mike Mimoso and Chris Brook recap the first day of this year's Security Analyst Summit, including Mark Dowd's memory corruption bug keynote, the digital archeology around Moonlight Maze, ATM hacking, and the Lazarus APT.

Memory Corruption Mitigations Doing Their Job

At the Security Analyst Summit, Mark Dowd described how memory corruption mitigations are successfully driving up exploit development costs.

Top 8 Reasons You Don’t Want to Miss SAS 2017

If you've never been to SAS, ask around. You really are missing out on the best security conference in the industry – and event where the best connections are made, high-quality discoveries are shared in a fun, casual atmosphere.

After legal settlement, Redflex’s six-month losses jump by nearly 10X

The Commonwealth Bank of Australia has also loaned the red light camera firm $7.5M.

Samsung heir, other top executives, indicted on corruption allegations

Charges come months after Samsung recalled its flagship Galaxy Note 7 phablet.

Linux’s decade-old flaw: Major distros move to patch serious kernel bug

Google fuzzer helps find 11-year-old memory-corruption flaw in the Linux kernel.

New SMB bug: How to crash Windows system with a ‘link...

Security researcher publishes exploit code after Microsoft drags feet on fix US CERT on Thursday issued a security advisory warning that all currently supported versions of Windows are vulnerable to a memory corruption bug that can be exploited to crash computers from afar.…

VU#867968: Microsoft Windows SMB Tree Connect Response denial of service vulnerability

Microsoft Windows contains a memory corruption bug in the handling of SMB traffic,which may allow a remote,unauthenticated attacker to cause a denial of service on a vulnerable system.

KopiLuwak: A New JavaScript Payload from Turla

A new, unique JavaScript payload is now being used by Turla in targeted attacks.

This new payload, dubbed KopiLuwak, is being delivered using embedded macros within Office documents.

Trump aides’ use of encrypted messaging verges on violating records law

Using disappearing messages in government could be a "recipe for corruption," says one expert.