Explained – How Intel AMT Vulnerability Allows to Hack Computers Remotely

Friday, May 5th, 2017

Earlier this week Intel announced a critical escalation of privilege bug that affects its remote management features shipping with Intel Server chipsets for past 7 years, which, if exploited, would allow a remote attacker to take control of vulnerable PCs, laptops, or servers. The vulnerability, labeled CVE-2017-5689, affects Intel remote management ...

Booby-trapped Word documents in the wild exploit critical Microsoft 0day

Saturday, April 8th, 2017

There's a new zeroday attack in the wild that's surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. The attack starts with an e-mail that attaches a malicious Word document, according to a blog post published Saturday by researchers ...

This ‘invisible’ memory-based malware is infiltrating organisations across the globe

Thursday, February 9th, 2017

Cybercriminals are launching 'invisible' attacks to infiltrate the networks of organisations to steal login credentials and financial data -- and the only tool they're using is legitimate software. It's thought that over 140 organisations including banks, telecommunications companies, and government organisations across the globe have fallen victim to these hidden malware ...

Choosing a Strong Password in 2017

Saturday, January 14th, 2017

Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password ...

CERT advises users to ‘discontinue use’ of two Netgear routers due to major security flaw

Saturday, December 10th, 2016

In a major setback for Netgear, it appears that at least two of its high-end routers may contain a severe security flaw according to an advisory issued by CERT. The vulnerability itself is incredibly easy to leverage and simply relies upon accessing a specially crafted URL in the following format from ...