Tagged: vulnerability

linux logo

Linux USB driver security issue

USB drivers included in the Linux kernel are rife with security flaws that in some cases can be exploited to run untrusted code and take over users’ computers. The vast majority of these vulnerabilities came to light on Monday, when Google security expert Andrey Konovalov informed the Linux community of 14 vulnerabilities he found in the Linux kernel USB subsystem. “All of them can...

twitter logo

Hackers find vulnerability to revive suspended Twitter accounts

A group of hackers claims to have found a way to seize inactive and suspended Twitter accounts, and is now selling them on the social network. “Spain Squad” gained control of a number of accounts they allege were obtained with the exploit, including @Hell, @Hitler, @Nazi, @ak47, and @1337. Worryingly, the Internet Archive shows that several of the handles held by Spain Squad were previously...

Software flaw puts mobile phones and networks at risk of complete takeover

Software flaw puts mobile phones and networks at risk of complete takeover

A newly disclosed software flaw could allow attackers to seize control of mobile phones and key parts of the world’s telecommunications infrastructure and make it possible to eavesdrop or disrupt entire networks, security experts warned Tuesday. The bug resides in a code library used in a wide range of telecommunication products, including radios in cell towers, routers, and switches, as well as the baseband...

Software vulnerability patching is too slow

Software vulnerability patching is too slow

Security holes and vulnerabilities are to be expected, but not enough is being done to patch holes quickly enough. This is the conclusion of Heimdal Security who conducted analysis of software vulnerabilities. The security firm found that while security problems are on the increase, companies are failing to keep pace and issues remain unaddressed for too long. It's something that hackers are taking advantage...

Was Heartbleed really that critical? Here’s why it wreaked havoc across the IT community

Was Heartbleed really that critical? Here’s why it wreaked havoc across the IT community

Secunia Research classifies vulnerabilities by rating the severity of vulnerabilities from 1: "not critical" to 5: "extremely critical." Going by the PR Heartbleed received, you would be excused for thinking that what we were dealing with here was, indeed, "extremely critical." But it was not, as vulnerabilities go. That rating we use for "remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation...

Third-party programs add to PC vulnerabilities

Third-party programs add to PC vulnerabilities

We reported earlier this week on how financial organizations are at risk from third parties with compromised security. It seems that the same thing applies to software. The latest review by IT security specialist Secunia shows that third-party programs are responsible for 76 percent of the vulnerabilities discovered in the 50 most popular programs in 2013. Secunia's review looks at the top 50 programs...