-0.2AI Score
7.1AI Score
Threat Outbreak Alert: Fake Unpaid Debt Invoice Email Messages on June 24, 2014
Low Alert ID: 27934 First Published: 2013 January 22 16:49 GMT Last Updated: 2014 June 25 13:04 GMT Version: 60 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain an unpaid debt invoice for the recipient. The text in the email...
0.5AI Score
7.1AI Score
0.1AI Score
0.3AI Score
0.1AI Score
-0.2AI Score
7.1AI Score
-0.1AI Score
AI Score
7.1AI Score
David Relson reports : Fix a heap corruption in base64 decoder on invalid input. Analysis and patch by Julius Plenz, [FU Berlin,...
-0.2AI Score
0.179EPSS
-0.4AI Score
-0.1AI Score
0.2AI Score
-0.5AI Score
-0.3AI Score
7.1AI Score
7.1AI Score
-0.4AI Score
-0.2AI Score
7.1AI Score
-0.1AI Score
7.1AI Score
bogofilter -- heap corruption by invalid base64 input
David Relson reports: Fix a heap corruption in base64 decoder on invalid input. Analysis and patch by Julius Plenz, [FU Berlin,...
6.7AI Score
0.179EPSS
Security flaw in 3G could allow anyone to track your smartphone
New privacy threats have been uncovered by security researchers that could allow every device operating on 3G networks to be tracked, according to research from the University of Birmingham with collaboration from the Technical University of Berlin. Researchers said that standard off-the-shelf...
7.1AI Score
AI Score
AI Score
AI Score
7.1AI Score
Samsung Fixes Remote Wipe Flaw in Galaxy S III Smartphones
Smartphone developer Samsung has reportedly fixed a flaw in one of its newest phones, the Galaxy S III, that allows attackers to remotely wipe the phone’s contents. The patch addresses a flaw presented at the Ekoparty Security Conference in Argentina late last week that showed how easy it was to...
1.5AI Score
-0.6AI Score
7.1AI Score
-0.6AI Score
0.1AI Score
7.1AI Score
It's The Stupidity, Stupid: How Absurd Pitches Help Online Scammers Find Their Marks
Do you find e-mail pleas for help from the widow of Democratic Republic of the Congo strongman Mobutu Sese Seko unconvincing or downright silly? That may be the point, according to Microsoft researcher Cormac Herley. The outlandish claims of Nigerian Letter – or “419” – scams serve a critical...
0.4AI Score
0.974EPSS
-0.1AI Score
Skype Vulnerability Exposing User IP Addresses
Skype Vulnerability Exposing User IP Addresses Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name. A script has been uploaded to Github...
6.5AI Score
TP-Link 8840T DSL router default remote management vulnerability
Overview The TP-Link 8840T DSL router's remote management feature is enabled by default. Description The TP-Link 8840T DSL router allows remote (WAN) internet users access to the administrator web interface of the device by default. Impact A remote unauthenticated attacker may be able to access...
2.3AI Score
The Value Of Data Privacy To Consumers? About 65 Cents.
What is the value of data privacy to online shoppers? About 65 cents, according to a new study of by researchers in Britain and Germany. The report: “Study on Monetising Privacy: An Economic Model for Pricing Personal Information” was released in February and presents the results of work by...
-0.4AI Score
0.7AI Score
Hackers Plan Satellite Network to Fight Internet Censorship
A group of hackers are reportedly declaring war on Internet censorship, and they plan to fight back with their own satellite communications network. Sound like science fiction? According to BBC News, the plan was recently outlined at the Chaos Communication Congress in Berlin. Dubbed the...
AI Score
Hackers launching own satellites in orbit to beat Censorship
Hackers launching own satellites in orbit to beat Censorship Worried about Internet censorship by SOPA and PIPA ? Wait !! This News is for you , Hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. Good guy hackers plan to...
6.9AI Score
Train-switching system can be vulnerable to DDoS attack
Train-switching system can be vulnerable to DDoS attack Hackers who have shut down websites by overwhelming them with web traffic could use the same approach to shut down the computers that control train switching systems, a security expert said at a hacking conference in Berlin. Prof. Stefan...
6.7AI Score
Researchers: Millions of Printers Vulnerable to Attack
Columbia University researchers say tens of millions of printers may have flawed firmware that could allow hackers to remotely set fires, erase code and infiltrate computer networks, according to a report on MSNBC’s Red Tape Chronicles blog today. Research conducted in the Computer Science...
0.6AI Score
Sony Detects Suspicious Behavior, Locks 93,000 Online Accounts
Sony locked the accounts of some 93,000 individuals on the Playstation Network (PSN), the Sony Entertainment Network (SEN), and Sony Online Entertainment (SOE) services following a mass log-in attempt using username-password combinations obtained from an unnamed source. The attack affected less...
0.3AI Score
0.2AI Score
Mysql.com hacked, serving BlackHole exploit malware
Mysql.com hacked, serving BlackHole exploit malware MySQL.com website is currently hacked and compromised with a JavaScript malware (and serving malware to anyone visiting it). The mysql.com website is injected with a script that generates an iFrame that redirects the visitors to...
6.7AI Score