Another Unpatched Adobe Flash Zero-Day vulnerability Exploited in the Wild

Monday, February 2nd, 2015

A critical vulnerability (CVE-2015-0313) exists in Adobe Flash Player 16.0.0.296 and earlier versions for Windows and Macintosh.  Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.  We are aware of reports that this vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer ...

New version of Autoruns integrates with VirusTotal

Sunday, February 1st, 2015

The new version of Microsoft's Autoruns (version 13 - released last week) integrates the VirusTotal API for quick analysis and verification of unknown and questionable processes.  After running the program, just right-click on any entry and select Check VirusTotal: You will need to accept VirusTotal's Terms of Service by clicking Yes: Once ...

D-Link routers vulnerable to DNS hijacking

Thursday, January 29th, 2015

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered. Todor Donev, a member of the Ethical Hacker research team, says that ...

New Chrome extension spots unencrypted tracking

Thursday, January 29th, 2015

A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet. It's hard to find a major website that doesn't use a variety of third-party tracking tools for online advertising, social media and analytics. But if the trackers send data unencrypted, ...

Critical GHOST vulnerability affects most Linux Systems

Wednesday, January 28th, 2015

A highly critical vulnerability has been unearthed in the GNU C Library (glibc), a widely used component of most Linux distributions, that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines. The vulnerability, dubbed "GHOST" and assigned CVE-2015-0235, was discovered and disclosed by the ...