In these days, a new anti-terrorism bill is becoming law in Russia, it includes a large number of issues related to internet monitoring. The terrorism is one of the dreaded threats on a global scale, almost every government is spending a significant effort in order to prevent plots against their population. Modern Terrorism is technological, it makes a large […]
The Thomson Reuters terrorist database World-Check used by banks and intelligence agencies worldwide was leaked online, 2.2 million records exposed. There is a terrorist database used by banks and intelligence agencies worldwide, it is called World-Check and unfortunately, it was leaked online. The leaked database is dated back 2014 and contains some 2.2 million records. […]
Lenovo fixed two flaws (CVE-2016-5249, CVE-2016-5248) in the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware. Lenovo has fixed two high severity vulnerabilities, CVE-2016-5249, and CVE-2016-5248, in its Lenovo Solution Center that could be exploited by hackers to gain access to vulnerable machines and to kill any process running on them. The […]
Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, the experts discovered that its kernel is unencrypted. The researchers from MIT Technology who reviewed […]
This disclosure of an unpatched Remote Code Exec flaw in the Swagger API framework compromises NodeJS, Ruby, PHP, and Java. Swagger is a representation of RESTful API that allows developers to get interactive documentation, client SDK generation and discoverability. The Swagger generators are privileged tools for organisations to offer developers easy access to their APIs. Currently, the […]
WordPress has recently issued the version 4.5.3 that patches more than two dozen vulnerabilities, including 17 bugs introduced in the last three releases. WordPress is one of the most popular content management systems for this reason is a privileged target of hackers. It is quite easy to scan the web searching for websites running old version affected […]
Experts from Cisco Talos discovered multiple security issues in the Libarchive library that is used by hundreds of other projects, including FreeBSD. Security vulnerabilities in the popular open source compression toolkit Libarchive affect countless of other projects that include the library. The flaw was discovered by experts from the Cisco Talos team that supported the Libarchive development team to […]
Like the FBI Director Comey also Zuckerberg use tapes to cover the webcam of his laptop, evidently he fear that someone could spy on him. A Facebook post published by Mark Zuckerberg to celebrate more than 500 million people now use Instagram is attracting the attention of IT experts. In the image that is included in the […]
Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]
A number of users are experiencing problems during logging into GoToMyPC because Citrix reset account passwords after hackers reportedly attacked it. It’s official, the GoToMyPC service operated by Citrix is the last victim of the hackers. GoToMyPC is remote desktop software that allows users to access and control their computers remotely by using a simple web browser. […]