Tagged: exploit

malwarebytes logo

Tarun has become a Malwarebytes Ambassador

I’m going to be talking about several things, Malwarebytes, the Malwarebytes Ambassador program, and what that also means for Lunarsoft. Recently, I was accepted into a special program to help raise awareness to people about the importance of your security and malware removal online. This is the Malwarebytes Ambassador program. Since Malwarebytes established their website and forums, I’ve also been a resident expert on...

intel logo

Report says Intel fixes leave PCs no more than 10% slower

Intel Corp., trying to defuse concern that fixes to widespread chip security vulnerabilities will slow computers, released test results late Wednesday showing that personal computers won’t be affected much and promised more information on servers. The chipmaker published a table of data showing that older processors handled typical tasks 10 percent slower at most, after being updated with security patches. The information covered three...

google logo

Google Docs has a sophisticated phishing attack

If someone invites you to edit a file in Google Docs today, don’t open it — it may be spam from a phishing scheme that’s been spreading quickly this afternoon. As detailed on Reddit, the attack sends targets an emailed invitation from someone they may know, takes them to a real Google sign-in screen, then asks them to “continue to Google Docs.” But this...

google logo

Google Pixel hacked in under 60 seconds

The Google Pixel fell to a team of Chinese hackers alongside Apple Safari and Adobe Flash at the PwnFest hacking competition in Seoul on Friday. Mountain View’s latest offering was smashed by white-hat friendlies from Qihoo 360, who used an undisclosed vulnerability to gain remote code execution for $120,000 cash prize. The exploit launched the Google Play store before opening Chrome and displaying a...

microsoft logo

Russian hackers exploit patched, update your Windows

Microsoft released 14 new security bulletins on Tuesday, in which, it addressed many security issues including a vulnerability actively exploited by a Russia-linked group and several other bugs for which exploits are publicly available. One of the security updates is MS16-135, a bulletin rated Important on severity level. MS16-135 resolves two information disclosure and three privilege elevation vulnerabilities, including a Windows kernel bug exploited...

apple logo

iPhone hack possible when opening jpg, pdf, or fonts

What’s worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod. Yes, attackers can take over your vulnerable Apple’s iOS device remotely – all they have to do is trick you to view a maliciously-crafted JPEG graphic or PDF file through a website or an email, which could allow them to execute malicious code on your...

linux logo

Critical Linux bug is under active exploit

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible. While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers...

apple logo

New Apple iOS bug lets hackers steal passwords with one text

If you don’t already have iOS 9.3.3, you better download and install it — quick. Cisco Talos, a security and research group, recently discovered a bug in Mac and iPhones that allows hackers to steal passwords with a single text message. The researchers at Cisco Talos alerted Apple, and the tech company immediately worked on a patch, which was released this week. “This is...

Critical Adobe Flash bug under attack has no patch

Critical Adobe Flash bug under attack has no patch

Attackers are exploiting a critical vulnerability in Adobe’s widely used Flash Player, and Adobe says it won’t have a patch ready until later this week. The active zero-day exploit works against the most recent Flash version 21.0.0.242 and was detected earlier this month by researchers from antivirus provider Kaspersky Lab, according to a blog post published Tuesday by Costin Raiu, the director of the...

Critical flaws on OEM laptops let hackers take over in 10 minutes

Critical flaws on OEM laptops let hackers take over in 10 minutes

Security researchers have discovered critical vulnerabilities in popular off-the-shelf HP, Acer, Dell, Asus and Lenovo laptops that make it possible for hackers to hijack and compromise the PCs in less than 10 minutes. Among cybersecurity professionals, it’s commonly known that if you want to have a secure PC, you probably shouldn’t use a regular off-the-shelf consumer laptop as they come with ‘bloatware’, or third-party...