The Tyupkin malware, spotted on ATMs in Eastern Europe, allows criminals to make withdrawals of 40 banknotes at a time, researchers at Kaspersky Lab said.
Browsing Category: Vulnerabilities
Yahoo CISO Alex Stamos confirmed that three servers had been infected with malware by hackers looking for machines vulnerable to Shellshock.
A vulnerability in the account creation process in Bugzilla, bug-tracking software developed and licensed by Mozilla, exposes vulnerabilities collected by the system. Mozilla is expected to patch the vulnerability today.
A weakness in Windows, similar to Shellshock, may put Windows Server deployments at risk to remote code execution.
Dennis Fisher and Mike Mimoso talk about the Bash Shellshock bug nightmare and the BadUSB code release.
Researcher Michal Zalewski published details on two recently discovered Shellshock vulnerabilities in Bash.
Two researchers published attack code exploiting weaknesses in USB similar to the BadUSB research presented at this year’s Black Hat conference.
There is another same-origin policy bypass vulnerability in the Android browser in versions prior to 4.4 that allows an attacker to steal data from a user’s browser.
A security update for the Joomla content management system was pulled and re-issued after problems with the first set of patches for a remote file inclusion and denial of service vulnerability were discovered.
VMware issued a progress report on fixes for four different types of products as they relate to the Bash vulnerability.