Monthly Archives: September 2018

Analysts Observe ‘Authentication Weakness’ in Device Enrollment Program of Apple

Analysts from Duo Security have identified a flaw which is called an Authentication Weakness in Device Enrollment Program of Apple. The vulnerability was stated to Apple this May 2018. It is not believed to be a main bug, however, it could possibly have severe results. It has asked from Apple company if it has or ideas to fix or patch the problem.

Continue reading

Compromised Accounts of Users Notified By Firefox

Mozilla set up a new service this week that supports users verify if their email addresses are component of publicly recognized data violates.

Dubbed Firefox Monitor and set up in business organization with Cloudflare and Troy Hunt, the service advantages the details acquirable through Troy Hunt’s Have I Been Pwned website to keep trail of users’ compromised accounts.

Continue reading

New Linux Kernel Flaw ‘Mutagen Astronomy’ Observed

Recently new Linux kernel ‘Mutagen Astronomy’  vulnerability has been observed that can simply be locally employed is however demonstrating a bit of a infliction. The CVE-2018-14634 flaw associates to a general advantage escalation vulnerability in the Linux kernel, and generates a mean to acquire core administrator benefits on a threat system.

Continue reading

Fixes Acquirable For Microsoft JET Database Zero-Day

Non-official fix is already acquirable for the unfixed Microsoft JET Database Engine flaw that Trend Micro’s Zero Day Initiative created public previous week. The security vulnerability, an out-of-bounds write in the JET Database Engine that could be victimized for distant code implementation, was stated to the vendor in some months ago in May.

Continue reading

macOS Mojave Fixes Flaws, But New Patches Already Appear

Apple released the updated version of its macOS operating system this Monday. macOS Mojave 10.14 presents some security improvements and fixes various flaws, however a new bug has already appeared. macOS Mojave states a total number of eight flaws impacting components likely App Store, Bluetooth, Application Firewall, Crash Reporter, Auto Unlock, Kernel and Security.

Continue reading

Revealed New Adwind Campaign For Operating Systems

Remote Access Trojan by Adwind samples discovered in a latest campaign were put together to acquire continuity on Windows, Linux, and macOS systems, Cisco Talos notifies. The threats attributed the Adwind 3.0 Remote Access Trojan and used a variable of the Dynamic Data Exchange code insertion threat on Microsoft Excel, ReversingLabs and Cisco Talos security researchers revealed.

Continue reading

Default Password Eliminated From Video Surveillance Manager By Cisco

A harmful flaw fixed recently in the Cisco Video Surveillance Manager could let an unverified hacker to log in as base. Cisco exposed the security vulnerability on Friday, influences merely the Video Surveillance Manager software functioning on definite Connected Safety and Security Unified Computing System platforms.

Continue reading

Severe Flaw Effects Thousands of IoT Security Cameras

A severe flaw in NUUO software could permit hackers to distantly check video feeds and manipulate with the recordings of thousands of security cameras, Tenable discloses. The flaw, which Tenable analysts named as Peekaboo, unlikely effects over hundreds of brands and about 2,500 various framework of cameras that are incorporated with NUUO’s software. Supplying access to customers’ usernames and passwords, the bug could be victimized to influence surveillance cameras and make them offline.

Continue reading

iOS 12 Conducts Fixes For 16 Security Flaws

Apple officially announced iOS 12 this week, which fixes different flaws in the mobile operating system and cunducts modified execution and other improvements. The tech giant also pushed latest updates for Apple TV 4K and Apple TV (4th generation) and Apple Watch Series 1 and lately, with the releasing of tvOS 12 and watchOS 5. Safari 12 and Apple Support 2.4 for iOS were also announced the running week.

Continue reading