During a recent enterprise size VOIP migration (200+ users) from a 10 year old VOIP phone system to a cloud based VOIP solution (vonage), I discovered some questions I never thought to ask potential VIOP providers. These questions were not thought of because they are expected when looking for a […]
Get the Ultimate 2018 Hacker Bundle – Pay What You Want
Due to the growing number of threats in the computer world, ethical hackers have become the most important player for not only governments but also private companies and IT firms in order to safeguard their systems and networks from hackers trying to infiltrate them. By 2020, employment in all information […]
Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely
If you have installed world’s most popular torrent download software, μTorrent, then you should download its latest version for Windows as soon as possible. Google’s security researcher at Project Zero discovered a serious remote code execution vulnerability in both the ‘μTorrent desktop app for Windows’ and newly launched ‘μTorrent Web’ that allows […]
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence
A hacker who was arrested and pleaded guilty last year—not because he hacked someone, but for creating and selling a remote access trojan that helped cyber criminals—has finally been sentenced to serve almost three years in prison. Taylor Huddleston, 26, of Hot Springs, Arkansas, pleaded guilty in July 2017 to one charge of aiding […]
Blue Coat: SSL Visibility Appliance web based vulnerabilities
Blue Coat has released a security advisory for SSL Visibility Appliance. The SSL Visibility Appliance is susceptible to multiple web-based vulnerabilities in the administration console. A remote attacker can use these vulnerabilities to obtain administrative access to the SSL Visibility Appliance. All versions of SSL Visibility prior to 3.8.4 are […]
Trojanized, Info-Stealing PuTTY Version Lurking Online
One of the best first steps in setting up a Windows machine is to install PuTTY on it, so you have a highly evolved secure shell at your command. An anonymous reader writes, though, with a note of caution if you’re installing PuTTY from a source other than the project’s […]
VENOM – Does it live up to the hype?
Unless you have been hiding under a rock this week you have heard about VENOM. The first article that I saw was from ZDNet with the headline of “Bigger than Heartbleed, ‘Venom’ security vulnerability threatens most datacenters”. Pretty provocative stuff. Is VENOM really worth that much hype? VENOM stands for Virtualized […]
SOC Analyst Pyramid
Bigger than Heartbleed, ‘Venom’ security vulnerability threatens most datacenters
VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open […]
Canada passes anti-terror bill that’s bad news for online privacy
An anti-terrorism bill with huge ramifications for online privacy has won over the Canadian House of Commons, despite all the protests held against it across the country. If it becomes a law, C-51, or the Anti-Terrorism Act, will give spy agencies the power to gather more information from its citizens […]