Top

Tag: Risk Assessment


Uncategorized

Android hijacking bug may allow attackers to install password-stealers

March 25, 2015

Via: Dan Goodin

Roughly half of all Android handsets are vulnerable to a newly discovered hack that in some cases allows attackers to surreptitiously modify or replace seemingly benign apps with malicious ones that steal passwords and other sensitive data. The “Android installer […]


Hardware & Software

Windows 10 to make the Secure Boot alt-OS lock out a reality

March 20, 2015

Via: Peter Bright

Those of you with long memories will recall a barrage of complaints in the run up to Windows 8’s launch that concerned the ability to install other operating systems—whether they be older versions of Windows, or alternatives such as Linux […]


Uncategorized

Epic Google snafu leaks hidden whois data for 280,000 domains

March 13, 2015

Via: Dan Goodin

Google leaked the complete hidden whois data attached to more than 282,000 domains registered through the company’s Google Apps for Work service, a breach that could bite good and bad guys alike. The 282,867 domains counted by Cisco Systems’ researchers […]


Uncategorized

Patched Windows PC remained vulnerable to Stuxnet USB exploits since 2010

March 10, 2015

Via: Dan Goodin

In August 2010, Microsoft patched a previously unknown USB vulnerability that state-sponsored attackers had secretly exploited for years, first to infect targets of the “omnipotent” Equation Group and shortly thereafter to spread the virulent Stuxnet worm inside Iranian nuclear facilities. […]


Uncategorized

Cutting-edge hack gives super user status by exploiting DRAM weakness

March 10, 2015

Via: Dan Goodin

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux. The technique, […]