12 C
London
Saturday, September 23, 2017
Home Tags Insecure

Tag: insecure

The latest targets of attackers are developers and insecure development processes, highlighting the need to instill security checkpoints in the development process.
In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code.

At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform.
It's only 0.0026 per cent of traffic, but it's all in plaintext so deserves a red flag Google's Chrome browser will soon label file transfer protocol (FTP) services insecure.…
Over 4,000 insecure Elasticsearch servers have been hosting the point-of-sale malware Alina and JackPoS.
Customers found PIN was just a date-time stamp, vulnerable to brute-forcing.
White-hats warn voteware kaput weeks ahead of Bundestag poll Software used in Germany for vote counting is insecure, according to research by the Chaos Computer Club (CCC).…
And this is the agency that wants to regulate the internet A laughably insecure comment system has left US comms watchdog the FCC open to malware attack, and the agency doesn't seem to know what to do about it.…
FCC API could be misused to host malware on FCC's domain.
Akeo Consulting Rufus fails to securely check for and retrieve updates,which an allow an authenticated attacker to execute arbitrary code on a vulnerable system.
Army of web scum constantly testing insecure things' well-known default passwords Criminals are constantly attempting to log into digital video recorders by using their default credentials, the SANS Institute has found.…
At the car wash, look out for attack robots.

Billy Rios discusses how IoT devices could be hacked to physically attack people -- not just on factory floors, but in everyday public settings.
An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.