21 Mar 2018

It is commonly known to all that you are not supposed to share remote access to your computer with any untrusted party for any reasons. But we should also keep in mind that you shouldn’t trust anyone who invites you to fully access their computer remotely. In Microsoft’s Windows Remote Assistance (Quick Assist) a new vulnerability…

20 Mar 2018

You may not be aware that the security standard HTTP Strict Transport Security (HSTS) can be misused as a supercookie to secretly track users of any web browser online without their knowledge even if they browse via private browsing feature. Apple added mitigations to its open-source browser infrastructure WebKit that underpins its Safari web browser…

17 Mar 2018

It is always best to use a good text editor as it helps you save time and makes work more efficiently. Example text editors like Sublime are very helpful as it has some useful tools like ‘syntax highlighting’ and ‘autocomplete’ which makes programming easier. Also, these text editors provide user extensibility which enables the user…

17 Mar 2018

Researchers have found an enormous continuously growing malware campaign which has infected around 5 million mobile devices worldwide. The malware called Dubbed RottenSys, was concealed as a ‘System Wi-Fi service’ app and arrived pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE. These infected devices were shipped…

16 Mar 2018

Researchers have found serious vulnerabilities in three popular VPN services that can leak the users real IP addresses and other sensitive data. Virtual Private Network or VPN, allow the users to securely access a private network and share data remotely through public networks. It is an ideal method to protect your daily online activities by…

15 Mar 2018

There was a massive malware outbreak last week which has infected almost half a million computers with cryptocurrency mining malware within few hours. It was caused by a backdoored version of the popular BitTorrent client named MediaGet. The malware known as Dubbed Dofoil or the Smoke Loader was found putting a cryptocurrency miner program as…

15 Mar 2018

The researchers at Cybersecurity Firm Preempt Security have found a critical vulnerability in Credential Security Support Provider protocol (CredSSP) which could infect all versions of Windows and could allow remote attackers to utilize the RDP and WinRM to abstract data and run malicious code. Credential Security Support Provider protocol (CredSSP) enables an application to securely…

14 Mar 2018

The latest stable release of the Samba 4.8 release series is available for download. It is Samba 4.8.0 Samba 4.7.6, 4.6.14 and 4.5.16 Security Releases are also available for download. These are the security releases in order to address the vulnerabilities CVE-2018-1050 (Denial of Service Attack on external print server) and CVE-2018-1057 (Authenticated users can…

03 Mar 2018

Remesh RamachandranIT Security Professional – Security Researcher & Consultant for the Government, Enthusiast, Malware Analyst, Penetration Tester. http://www.remeshr.com