Quantcast
Channel: Netward Security Blog
Browsing all 25 articles
Browse latest View live

Trojan Android Apps Create an SMS Botnet

With the increase of Android based devices within the mobile phone market in recent years, it seems that some hackers are warming to the idea of creating more advanced malware targeted at android...

View Article



Windows XP vulnerable to a new Internet explorer exploit

UPDATE 8th JAN - Security researchers with Exodus intelligence have since reported a bypass for the Microsoft Fixit solution mentioned below. It should be noted that the exploit to counter Microsoft’s...

View Article

Yahoo Mail Vulnerable to XSS Exploit / SSL Made Available to Users

With over 200 Million estimated users, Yahoo mail competes with the likes of Google Mail and hotmail and has become one of the largest webmail providers to date. A video has been posted on YouTube...

View Article

Firefox 18 released – 21 vulnerabilities patched

In the space of little under two months since version 17 was released, Mozilla has patched nearly 3000 reported bugs in their browser, along with 21 security vulnerabilities – 12 of which were...

View Article

‘Red October’ Large Scale Cyber Espionage Campaign Revealed After 5 Years of...

The findings come after Kaspersky lab lead research into a series of targeted attacks aimed at various diplomatic, governmental and scientific research organizations (see map); dubbed Red October...

View Article


UPnP – Security Researchers Say: “Unplug n’ Don’t Play”

What is UPnP? First launched in 1999, Universal Plug and Play (UPnP) technology is the product of an industry initiative to enable peer-to-peer data communication between any two devices on a home or...

View Article

The New York Times – Infiltrated by Chinese Hackers

It has emerged that the New York Times has fallen victim to a cyber espionage attack that began in September of 2012. The attacks appeared to be focused exclusively on accessing information from both...

View Article

News: Passcode Flaw in iOS v6.1

A flaw in Apple’s latest iOS release (v6.1) potentially allows a thief to access contacts, voicemails and make calls on a passcode protected iPhone. In a video posted on YouTube, a technique used to...

View Article


Report: The safety of national infrastructure is greatly undermined by a lack...

Introduction SCADA is an acronym for Supervisory Control And Data Acquisition, a form of Industrial Control System (ICS) that typically controls and monitors larger scale industrial processes, public...

View Article


Firefox and Chrome both patched after PWNing at CanSecWest

The annual PWN2OWN ‘battle of the browsers’ contest in Vancouver, organised by Google and HP’s Zero-Day-Initiative is an opportunity for some of the best talent from both the black hat and white hat...

View Article

Aside: School children phish teachers login credentials

School children phish teacher login details at a school in Alaska. A group of children allegedly obtained the details by fooling their teachers in to thinking they were authorising a software update....

View Article

Trojan Android Apps Create an SMS Botnet

With the increase of Android based devices within the mobile phone market in recent years, it seems that some hackers are warming to the idea of creating more advanced malware targeted at android...

View Article

Useful Router IOS Command list updated

I have updated the Useful Cisco IOS Commands (Router) command list to also include: Standard and extended ACLs NAT & PAT DHCP Some corrections to existing commands If you think this resource is of...

View Article


Feature of Apple iOS exposes users to WiFi attacks

Have you ever glanced at your iPhone or iPad to find that you are automatically connected to a WiFi network that you didn’t tell it to connect to? Maybe it has the same SSID (network name) as a hotel’s...

View Article

Image may be NSFW.
Clik here to view.

Why using Perfect Forward Secrecy pays off

UPDATE – With the latest release of Mozilla Firefox (v.25) and the Calomel add-on, users can now view whether perfect forward secrecy is being used by a website, from within the Firefox browser. When...

View Article


Image may be NSFW.
Clik here to view.

19 Vulnerabilities Patched in Microsoft November Update Cycle

Image courtesy of maximumpc.com Microsoft’s latest patch Tuesday included fixes for 19 separate vulnerabilities, spread over 8 security bulletins with 3 of the bulletins were rated with the maximum...

View Article

Image may be NSFW.
Clik here to view.

0-day Uses .tiff Images as Delivery Vehicle for Remote Code Execution

What is TIFF? The Tagged Image File Format (.tiff) is an old image file format, still popular with many digital image manipulators and artists today. Unlike compressed image formats such as JPEG, TIFF...

View Article


Image may be NSFW.
Clik here to view.

What’s new in HTTP version 2?

It has been fourteen years since the last revision of the ubiquitous HyperText Transfer Protocol, version 1.1. Since its conception in the early nineties, HTTP has indisputably become the de-facto...

View Article

Image may be NSFW.
Clik here to view.

Research highlights flaws in Internet routing protocol BGP

A provider of specialist Internet monitoring systems, Renesys, has published research which claims to show that large chunks of Internet traffic was diverted several times during the 2013 calendar...

View Article

Image may be NSFW.
Clik here to view.

Yahoo! Credentials Leaked

Yahoo! has announced they’ve discovered attempts to access Yahoo mail accounts. Little information has currently been released about what happened, but it appears a number of usernames and passwords...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images