Home Tags Hypertext Markup Language (HTML)

Tag: Hypertext Markup Language (HTML)

We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.

According to our research, connecting a software license management token to a computer may open a hidden remote access channel for an attacker.
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
CPU hardware implementations are vulnerable to cache side-channel attacks.

These vulnerabilities are referred to as Meltdown and Spectre.
Acquired December 1997, Hotmail was the gift that kept on givingmdash;for good or ill.

Happy IR in the New Year!

Endpoint anal In IR cases we use a very simple script that is uploaded to every Windows computer in the corporate network to collect logs, NTFS data, entries from the Windows registry and strings from the binary files to find out how exactly the attackers were moving through the network.
Itrsquo;s holiday season and it is our pleasure to share this script with you.

What’s new in HTML5.2

HTML5.2, an upgrade to the core HTML5 specification providing the structure of webpages, is now released by the World Wide Web Consortium (W3C) and includes enhancements for security and commerce.The specification, referred to by W3C as a recommenda...
TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding,and may therefore be vulnerable to Bleichenbacher-style attacks..

This attack is known as aROBOT attackquot;.
Apple MacOS High Sierra fails to properly require authentication for disabled accounts,such as root account,which can allow an authenticated user to obtain root privileges.

Android commercial spyware

Therersquo;s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools.
In reality, however, these apps barely differ from spyware, with the exception perhaps of the installation method.
Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented.

This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy.

Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomize executables that do not opt in to ASLR.
Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new event is an exciting new research avenue for us, as what were once theoretical problems find palpable expression in reality. On the other hand, as people with a heightened concern for the security posture of users at large, each event is a bigger catastrophe.
Savitech provides USB audio drivers for a number of specialized audio products.
Some versions of the Savitech driver package silently install a root CA certificate into the Windows trusted root certificate store.