Cutting-edge hack gives super user status by exploiting DRAM weakness

Monday, March 9th, 2015

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux. The technique, outlined in a blog post published Monday by Google's Project Zero ...

Serious bug in fully patched Internet Explorer puts user credentials at risk

Wednesday, February 4th, 2015

A vulnerability in fully patched versions of Internet Explorer allows attackers to steal login credentials and inject malicious content into users' browsing sessions. Microsoft officials said they're working on a fix for the bug, which works successfully on IE 11 running on both Windows 7 and 8.1. The vulnerability is known ...

D-Link routers vulnerable to DNS hijacking

Thursday, January 29th, 2015

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered. Todor Donev, a member of the Ethical Hacker research team, says that ...

Critical GHOST vulnerability affects most Linux Systems

Wednesday, January 28th, 2015

A highly critical vulnerability has been unearthed in the GNU C Library (glibc), a widely used component of most Linux distributions, that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines. The vulnerability, dubbed "GHOST" and assigned CVE-2015-0235, was discovered and disclosed by the ...

Study Uncovers 40,000 Malicious Mobile Banking Apps

Thursday, January 22nd, 2015

Mobile banking is an increasingly popular way to stay on top of one’s finances, with the ability to check balances, transfer money and even deposit checks virtually. Unfortunately, the sector is also a rich tapestry of criminal activity, with 11% of mobile banking apps categorized as “suspicious.” According to research findings ...