Rootpipe — Critical Mac OS X Yosemite Vulnerability Allows Root Access Without Password

A Swedish Security researcher has discovered a critical vulnerability in Apple’s OS X Yosemite that gives hackers the ability to escalate administrative privileges on a compromised machine, and allows them to gain the highest level of access on a machine, […]

Read more

AVAST: 5 steps to keep your SMB data protected

When Edward Snowden came forward in May 2013, accusing the world’s largest intelligence service of spying on US allies, people, and private companies, it became evident that electronic data is quite vulnerable. This major event even caused Russian and German […]

Read more

The Hacker News: Microsoft Windows Zero-Day Vulnerability “CVE-2014-4114” Used to Hack NATO

Once again a Russian cyber espionage group has gained media attention by exploiting a Zero-day vulnerability in Microsoft’s Windows operating system to spy on the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive […]

Read more

AVAST Blog: What is the Bash bug, and how do I prevent my systems from being Shellshocked?

Working in the same way as SQL injection, Shellshock allows users to insert Bash (a Unix-based command processor, or shell) commands into a server via a web form or similar method, and exploits the very nature of environment variable handling, […]

Read more

Bash bug fallout: Shell Shocked yet? You will be … when this becomes a worm

Much of the impact of the Shell Shocked vulnerability is unknown and will surface in the coming months as researchers, admins and attackers (natch) find new avenues of exploitation. The vulnerability, coined Shell Shocked by researcher Robert Graham, existed in […]

Read more

Free service helps CryptoLocker victims to recover files

Ransomware is a particularly nasty piece of malware that takes infected machines hostage. CryptoLocker was successful at garnering multi-millions in ransom payments the first two months of CryptoLocker’s distribution, according to a recent blog by FireEye regarding the takeover of […]

Read more