6.4 C
London
Friday, January 24, 2020
A new malicious Android remote access tool (RAT) called BRATA was reported by Kaspersky researchers, has infectedand spy from WhatsApp and SMS messages to Brazilian users. “BRATA” is a new Android remote access tool malware family. We used this code name based on its description – “Brazilian...
Outlook Password recovery has reported yesterday as part of vulnerability from exploiting sites. This software in version 2.10 is easily exploited by Denial of Service method or does attack says the report. Outlook Password Recovery Master recovers mailbox passwords and PST passwords in all imaginable versions...
Cisco devices OS is part of the vulnerability issue reported yesterday, Cisco in her blog. The security issue is tracked as CVE-2019-12643. It received the maximum severity score of 10 and resides in the REST API virtual service container for Cisco's OS. The following products...
Symantec and Microsoft have come to an agreement about Symantec/Norton AV problems with the August Win7 and Server 2008 R2 patches. The block is gone, but questions remain. Nothing has changed, so why was it blocked in the first place? If you’re using...
According to Risk Based Security research newly published in the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 have seen more than 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records.  Perhaps even more remarkable is the fact that...
A new Trojan dropper dubbed xHelper was observed while slowly but steadily spreading to more and more Android devices since May, with over 32,000 smartphones and tablets having been found infected in the last four months. Trojan droppers are tools used by threat actors...
Widnows 10 has reported from exploitdb sites by Project Zero developers. "After multiple previous attempts the kernel mitigation against adding arbitrary NTFS mount points seems pretty robust. However due to the way it was implemented inside the IO manager in the kernel it is...
A U.S. judge ordered Capital One hacker Paige Thompson to remain in custody pending trial because her “bizarre and erratic” behavior makes the woman at risk. The judge argued that she is a flight risk and poses a physical danger to herself and...
There is a skills crisis. Traditionally, IT has outsourced to fill the skills gap, but in the gig economy, there are new approaches to sourcing technical skills A report on the new economy from Open Assembly and TopCoder has suggested that businesses need...
IT admins will be able to use the policies to manage, deploy and update the new browser to their corporate workforce. Microsoft has published the template and documentation that will be required to manage updates of the not-yet-finalized "full-Chromium" Edge browser, making good...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it