Critical Vulnerability

Type: Keyphrase
Name: Critical Vulnerability
First reported 20 hours ago - Updated 4 hours ago - 1 reports

BlackBerry Launches Guardian Program for Added App Security, Acquires Voice Encryption Service Provider Secusmart

BlackBerryThe BlackBerry Guardian program that incorporates Trend Micro's Mobile App Reputation Service, as mentioned in the company Business Blog, would be available free for users of the BlackBerry Classic along with other future BB 10 devices including ... [Published International Business Times Australia - 20 hours ago]
First reported Jul 30 2014 - Updated Jul 31 2014 - 1 reports

Attackers Compromise TOR Network to De-Anonymize Users of Hidden Services

A critical vulnerability in Tor — an encrypted anonymizing network considered to be one of the most privacy oriented service, which is used by online users in order to hide their activities from law enforcement, government censors and others — was probably ... [Published THN : The Hacker News - Jul 30 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Find Out How Vulnerable Your Android Is

Security patches for Android OS are not delivered at the same time for all users because their implementation often depends on third-parties, carriers and/or phone manufacturers. In the meantime, there is a simple way to check if the device is affected ... [Published Softpedia - Jul 30 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Millions of Android devices exposed to fake ID flaw

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered a critical vulnerability in millions of Android ... [Published Security Affairs - Jul 30 2014]
First reported Jul 29 2014 - Updated Jul 30 2014 - 1 reports

Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Apps

There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way, enabling an attacker to take a number of actions, including inserting malicious code into a legitimate ... [Published threatpost - The First Stop for Security News - Jul 29 2014]
First reported Jul 24 2014 - Updated Jul 25 2014 - 5 reports

Thousands of sites compromised through WordPress plug-in vulnerability

A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far. ... [Published Security - Infoworld - Jul 24 2014]
First reported Jul 17 2014 - Updated Jul 17 2014 - 2 reports

Vulnerability exposes some Cisco home wireless devices to hacking

Nine of Cisco’s home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them. The company has shared the ... [Published PC World: Techlog - Jul 17 2014]
First reported Jul 17 2014 - Updated Jul 17 2014 - 2 reports

Flaw exposes some Cisco home wireless devices to hacking

Nine of Cisco's home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them. ... [Published Computerworld Malware and Vulnerabilities News - Jul 17 2014]
First reported Jul 16 2014 - Updated Jul 17 2014 - 2 reports

Microsoft Internet Explorer ShowSaveFileDialog() Sandbox Bypass

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Internet Explorer. The vulnerability is caused due to an invalid handling of a sequence of actions aimed to save a file when calling "ShowSaveFileDialog()", which could ... [Published Packet Storm Security Advisories - Jul 16 2014]
First reported Jul 15 2014 - Updated Jul 15 2014 - 2 reports

Vulnerability in WPTouch WordPress Plugin Allows Hackers to Upload PHP backdoors

If you own a mobile version for your Wordpress website using the popular WPtouch plugin, then you may expose to a critical vulnerability that could potentially allow any non-administrative logged-in user to upload malicious PHP files or backdoors to the ... [Published The Hacker News - Jul 15 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Melchior: New Mexico's Health-care Exchange Has 'High and Critical Vulnerability'

Make sure to check out Jillian’s latest investigation, “ HHS Audit Finds Security Weaknesses in New Mexico’s Obamacare Exchange .” ... [Published National Review - Jul 08 2014]
First reported Jul 04 2014 - Updated Jul 04 2014 - 3 reports

Critical Vulnerability Found In Popular WordPress Newsletter Plugin by @mattsouthern

Web security firm, Sucuri, found a critical vulnerability in a WordPress plug-in that has over 1.7 million downloads. The vulnerability allows potential attackers to take complete control of blogs that have the plugin installed. The vulnerability was ... [Published Search Engine Journal - Jul 04 2014]

Quotes

...4% of whole Tor network), those were actively monitoring the relays on both ends of a Tor circuit in an effort to de-anonymize users. " While we don't know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected, " Tor said. When you use Tor anonymizing network, your IP address remains hidden and it appears that your connection is coming from the IP address of...
...However, in other cases, "if the server is not properly configured, which is not uncommon, then [the infection] can spread to all sites and accounts on the same server."
...not really feasible to patch for one out of whatever number are released; you either have that patch with all of them or you don't," Barrett said. "The decrease might just be a fluctuation, or it might reflect a gradual lessening in the attention and exposure being associated with Java vulnerabilities." Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com . Follow him on Twitter @TechJournalist

More Content

All (305) | News (91) | Reports (0) | Blogs (214) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
BlackBerry Launches Guardian Program for Added ... [Published International Business Times Australia - 20 hours ago]
iValue To Distribute CyberArk Across India [Published Channel Times - Jul 31 2014]
Discovered attacks to compromise TOR Network an... [Published Security Affairs - Jul 31 2014]
Your Android has a Fake ID problem, allowing ma... [Published Computerworld - Jul 30 2014]
Real value of Bitcoin [Published The Hill - Jul 30 2014]
Attackers Compromise TOR Network to De-Anonymiz... [Published The Hacker News - Jul 30 2014]
Attackers Compromise TOR Network to De-Anonymiz... [Published THN : The Hacker News - Jul 30 2014]
iValue Now a Value-added Distributor for CyberA... [Published APN News - Jul 30 2014]
Find Out How Vulnerable Your Android Is [Published Softpedia - Jul 30 2014]
Millions of Android devices exposed to fake ID ... [Published Security Affairs - Jul 30 2014]
Critical Android FakeID Bug Allows Attackers to... [Published threatpost - The First Stop for Security News - Jul 29 2014]
TAILS Team Recommends Workarounds for Flaw in I2P [Published threatpost - The First Stop for Security News - Jul 25 2014]
Fortinet Delivers World's Fastest Firewall [Published CIO India - Jul 25 2014]
Thousands of sites compromised through WordPres... [Published Security - Infoworld - Jul 24 2014]
Thousands of sites compromised through WordPres... [Published CIO Australia - Jul 24 2014]
Thousands of sites compromised through WordPres... [Published PC World: Techlog - Jul 24 2014]
Thousands of sites compromised through WordPres... [Published Computerworld - Security RSS feed - Jul 24 2014]
Thousands of sites compromised by WordPress plu... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
Thousands of sites compromised through WordPres... [Published Techworld.com Security - Jul 24 2014]
Researchers Demo TAILS Flaw Exploit, Disclose D... [Published threatpost - The First Stop for Security News - Jul 23 2014]
Invest In The Man Or The Machine? Are Burberry ... [Published Yahoo! UK and Ireland - Jul 17 2014]
Vulnerability exposes some Cisco home wireless ... [Published PC World: Techlog - Jul 17 2014]
Vulnerability exposes some Cisco home wireless ... [Published Computerworld - Security RSS feed - Jul 17 2014]
Flaw exposes some Cisco home wireless devices t... [Published Computerworld Malware and Vulnerabilities News - Jul 17 2014]
Cisco fixes critical flaw in modems and wireles... [Published Help Net Security - News - Jul 17 2014]
Microsoft Windows DirectShow Privilege Escalation [Published Packet Storm Security Advisories - Jul 16 2014]
Microsoft Internet Explorer ShowSaveFileDialog(... [Published Packet Storm Security Advisories - Jul 16 2014]
Microsoft Internet Explorer Request Object Conf... [Published Packet Storm Security Advisories - Jul 16 2014]
Microsoft Internet Explorer CSS @import Memory ... [Published Packet Storm Security Advisories - Jul 16 2014]
Oracle Updates New Database for Old Flaws [Published eWeek - Jul 16 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Discovered attacks to compromise TOR Network an... [Published Security Affairs - Jul 31 2014]
On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor Network users with confirmation attack technique. Tor network is an excellent technology to ensure users’ online anonymity , thanks to ...
Attackers Compromise TOR Network to De-Anonymiz... [Published THN : The Hacker News - Jul 30 2014]
A critical vulnerability in Tor — an encrypted anonymizing network considered to be one of the most privacy oriented service, which is used by online users in order to hide their activities from law enforcement, government censors and others — was probably ...
Millions of Android devices exposed to fake ID ... [Published Security Affairs - Jul 30 2014]
Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered a critical vulnerability in millions of Android ...
Critical Android FakeID Bug Allows Attackers to... [Published threatpost - The First Stop for Security News - Jul 29 2014]
There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way, enabling an attacker to take a number of actions, including inserting malicious code into a legitimate ...
TAILS Team Recommends Workarounds for Flaw in I2P [Published threatpost - The First Stop for Security News - Jul 25 2014]
The developers of the TAILS operating system say that users can mitigate the severity of the critical vulnerability researchers discovered in the I2P software that’s bundled with TAILS with a couple of workarounds, but there is no patch for the bug yet. ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.