Yearly Archives: 2012

Joomla 3.0.2 and 2.5.8 Available For Download, Security Fixes Included


November 9, 2012 By
The Vigilant Application Owner

Softpedia – (International) Joomla 3.0.2 and 2.5.8 available for download, security fixes included. The Joomla Project released Joomla 3.0.2 and Joomla 2.5.8. Both variants come with a number of improvements, including fixes for security issues. In Joomla 3.0.2, a medium priority cross-site scripting (XSS) vulnerability that affected the language search component was fixed. In the […]

Continue reading...

Siemens Software Targeted By Stuxnet Still Full Of Holes


November 8, 2012 By
The Vigilant Application Owner

IDG News Service – (International) Siemens software targeted by Stuxnet still full of holes. Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities, according to researchers. The CTO of Positive Technologies was scheduled to give a presentation in July at Defcon, but it was pulled after Siemens […]

Continue reading...

How Hackers Scrape RAM To Circumvent Encryption


By
The Vigilant Application Owner

ZDNet – (International) How hackers scrape RAM to circumvent encryption. Speaking at Verizon’s media day forum November 7, the company’s business investigative response managing principal said the various encryption standards today do a good job of protecting data that is at rest, such as data stored on a server or in transit across a network. […]

Continue reading...

Mushrooming Ransomware Now Extorts $5 Million A Year


By
The Vigilant Application Owner

Ars Technica – (International) Mushrooming ransomware now extorts $5 million a year. Malware that disables computers and demands that hefty cash payments be paid to purported law-enforcement agencies before the machines are restored is extorting as much as $5 million from end-user victims, researchers said. The estimate, contained in a report published November 8 by […]

Continue reading...

Virtual Machine Used To Steal Crypto Keys From Other VM On Same Server


November 6, 2012 By
The Vigilant Application Owner

Ars Technica – (International) Virtual machine used to steal crypto keys from other VM on same server. Piercing a key defense found in cloud environments such as Amazon’s EC2 service, scientists devised a virtual machine that can extract private cryptographic keys stored on a separate virtual machine when it resides on the same piece of […]

Continue reading...

Users Take Their Time Over Java And Flash Updates


By
The Vigilant Application Owner

The H – (International) Users take their time over Java and Flash updates. Of the computers studied by Kaspersky in the third quarter of 2012, 35 percent suffered from a Java vulnerability and 19 percent from a vulnerability in an Adobe product. Comparing Kaspersky’s quarterly security reports from 2010-2012 shows that the Oracle and Adobe […]

Continue reading...

Sophos Fixes Critical Security Vulnerability


By
The Vigilant Application Owner

The H – (International) Sophos fixes critical security vulnerability. A security expert revealed critical security vulnerabilities in Sophos antivirus software. This includes the publication of a proof-of-concept for a root exploit for Sophos 8.0.6 for Mac OS X, which utilizes a stack buffer overflow when searching through PDF files. The vulnerability is also likely to […]

Continue reading...

Security Research Labels Over 290,000 Google Play Andoid Apps As ‘High-risk’


November 1, 2012 By
The Vigilant Application Owner

Network World – (International) Security research labels over 290,000 Google Play Android apps as ‘high-risk’. One-quarter of more than 400,000 Android applications examined in the Google Play store pose security risks to mobile-device users, according to new research. Security vendor Bit9 categorized these Android apps as questionable or suspicious because they could gain access to […]

Continue reading...