Monthly Archives: October 2018

Security Updates For Practically Apple’s Supported Products

Moving in after the hoopla of Tuesday’s MacBook show was a fixed of security updates for practically entire of the supported products of Apple. The Cupertino creator of shiny position symbols has posted security patches for dozens of CVE-mentioned flaws in AppleTV, macOS, and iOS, as well as watchOS and single applications such as iCloud and iTunes.

Continue reading

X.Org Vulnerability Reveals Unix-Like OSes To Threats

Various sorts of Unix operating systems are impacted by a possibly critical X.Org flaw that can be employed for advantage arise and absolute code implementation.

X.Org is a famous open source execution of the X Windows System which is also recognized as X11, X or X-Windows. The visual communication windowing system employed by Linux and BSD operating systems.

Continue reading

A Cyber-crime of $6.5 Million Attempted Over BankIslami

Banking system of Pakistan has become a victim of cyber-crime once again. The sources declare that BankIslami is the merely bank that has been impacted in the recent threat that occurred previous weekend on Saturday.

Online users and ATM cardholders of BankIslami stated some irregular action and noted massive unauthorized transactions done internationally earlier on Saturday. However, The bank denies  entirely about the figure mentioned by the VISA, international payment provider, and other industry sources which are actually approximated about $6 million to $6.5 million.

Continue reading

IBM Buys Open Source Firm Red Hat For $34 Billion

IBM declared that they has done a deal to purchase an open source software firm Red Hat for $34 billion. It is the biggest tech integration in history which the computing giant stated would improve its cloud contributions.  If accepted it will be the third greatest tech integration in history. The open source firm, Red Hat declared that it was the greatest involvement of a software company.

Continue reading

Windows Zero-Day Exploit Disclosed on Twitter

A new Microsoft Windows Zero-Day vulnerability was revealed publicly on Twitter by the analyst who disclosed an exploit for a flaw in the Windows Task Scheduler couple of months ago in August. The recently disclosed security bug affects the Microsoft Data Sharing library dssvc.dll, and can be victimized by the hackers who formerly have access to the impacted system.

Continue reading

Arcserve Vulnerabilities Burrow Distantly Employed Flaws in UDP Storage Systems

Companies functioning Arcserve Unified Data Protection to handle their archives and backups are being instructed to update their software after flaw hunters identified four distantly effort security bugs.

Analysts with Digital Defense discovered the running month four flaws that, if employed through a phishing threat or harmful webpage, would permit a hacker to elevate credentials or approach data funded in the recovery system and UDP data archiving through its web services elements.

Continue reading

VLC and Other Software Affected By Bug in Media Library

A critical flaw in the LIVE555 Streaming Media RTSP server impacts famous applications, comprising VLC, MPlayer and others, Cisco Talos has observed.

Live Networks, Inc, developed LIVE555 Streaming Media mentions an open-source set of C++ libraries indicated for multimedia streaming. The libraries offer assistance for open standards employed in streaming, however can also be utilized for organizing of different famous formats of video and audio. The libraries are employed for cameras and other embedded gadgets in addition to media players.

Continue reading

Critical Security Bugs in FreeRTOS Threats To Widespread Hijacking

Critical security bugs in FreeRTOS; an operating system kernel utilized in numerous internet-connected gadgets and embedded electronics; can be possible employed over the network to seize kit. Merely transmitting particularly crafted harmful data to a unsafe device, over the internet or network, can be adequate to crash or hijack it, meaning offenders can possibly get hold of controlling devices of strangers; if they utilize a unsafe kernel.

Continue reading