7.4 C
London
Friday, November 24, 2017
Home Tags Hypertext Transfer Protocol (HTTP)

Tag: Hypertext Transfer Protocol (HTTP)

Android commercial spyware

Therersquo;s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools.
In reality, however, these apps barely differ from spyware, with the exception perhaps of the installation method.
Artificial intelligence-based telematics planning solution increases journeys per day by 20% and supports growing adoption of electric fleetsCambridge, UK, 21 November 2017.

Aimed at fleet operators moving to electric vehicles (EVs), Spark EV (http://w...
Researchers watch publishers watching you, ignore privacy settings, run over mere HTTP Researchers working on browser fingerprinting found themselves distracted by a much more serious privacy breach: analytical scripts siphoning off masses of user inte...
"JoltandBleed" memory leak gives attackers full access to business applications.
In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employeersquo;s home computer system.

To assist any independent investigators and all the people who have been asking us questions whether those allegations were true, we decided to conduct an internal investigation to attempt to answer a few questions we had related to the article and some others
A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly san...
While no consensus exists on how to define microservices, it is generally agreed that they are an architectural pattern that is composed of loosely coupled, autonomous, fine-grained services. The services are independently deployable and communicate...
TLS over HTTP? Yes please, says every sysadmin, netizen The Internet Engineering Task Force (IETF) has just put out a new draft for a standard that would enable folks to effectively bypass surveillance equipment on their networks to maintain secure con...
All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST request, researchers revealed today.

DDoS attacks in Q3 2017

In the third quarter of 2017, we registered a considerable increase in the number of both DDoS attacks and their targets.

Traditionally, China is the country with the largest number of attack sources and targets.
It was followed by the United States and South Korea.

The popularity of Windows OS as a basis for creating a botnet has fallen noticeably, while the share of Linux-based botnets increased proportionally.
TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected.
The P1735 IEEE standard describes methods for encrypting electronic-design intellectual property(IP),as well as the management of access rights for such IP.

The methods are flawed and,in the most egregious cases,enable attack vectors that allow recovery of the entire underlying plaintext IP.
Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key,among other impacts.