Category: Research & Alerts

Let’s Encrypt!, (Fri, Feb 27th) 0

Let’s Encrypt!, (Fri, Feb 27th)

As I have stated in the past ,I am not a fan of all of the incomprehensible warning messages that average users are inundated with, and almost universally fail to understand, and the click-thru culture these dialogsare propagating. Unfortunately this is not just confined to websites on the Internet

VU#632140: Multiple Toshiba products are vulnerable to trusted service path privilege escalation 0

VU#632140: Multiple Toshiba products are vulnerable to trusted service path privilege escalation

Vulnerability Note VU#632140 Multiple Toshiba products are vulnerable to trusted service path privilege escalation Original Release date: 27 Feb 2015 | Last revised: 27 Feb 2015 Overview Bluetooth Stack for Windows by Toshiba and TOSHIBA Service Station contain a trusted service path privilege escalation vulnerability. Description CWE-428 : Unquoted Search Path or Element Bluetooth Stack for Windows by Toshiba versions 9.10.27(T) and earlier, as well as TOSHIBA Service Station versions 2.2.13 and earlier, contain a trusted service path privilege escalation vulnerability. Impact A local authenticated attacker may be able to escalate privileges to SYSTEM

Thumbnail 0

Spam Uses Default Passwords to Hack Routers

In case you needed yet another reason to change the default username and password on your wired or wireless Internet router: Phishers are sending out links that, when clicked, quietly alter the settings on vulnerable routers to harvest online banking credentials and other sensitive data from victims.