Archive for June, 2017

Windows 10 to Get Built-in Protection Against Most Ransomware Attacks

June 30th, 2017

Ransomware Ransomware Everywhere Not a Single Place to Hide!

But, Microsoft has a simple solution to this problem to protect millions of its users against most ransomware attacks.

Two massive ransomware attacks — WannaCry and Petya (also known as NotPetya) — in a month have caused chaos and disruption worldwide, forcing hospitals, ATMs, shipping companies, governments, airports and car

Posted in anti-ransomware, Controlled folder access, EMET, hacking news, NotPetya ransomware, Petya ransomware, ransomware, WannaCry Ransomware, Windows 10, Windows 10 Insider Preview Build, Windows Defender | Comments (0)

ISC Stormcast For Friday, June 30th 2017 https://isc.sans.edu/podcastdetail.html?id=5566, (Fri, Jun 30th)

June 30th, 2017

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Posted in Uncategorized | Comments (0)

Adobe Acrobat Reader Dc Continuous Windows Execute Code Vulnerability

June 30th, 2017

Adobe Acrobat Reader Dc is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Posted in Uncategorized | Comments (0)

Google Android 7 MediaTek Gain privileges Vulnerability

June 30th, 2017

Google Android is prone to a gain privilege vulnerability. This allow local or remote attackers to gain privileges via a crafted application.

Posted in Uncategorized | Comments (0)

Adobe Reader 11.0.17 OS X Denial Of Service Execute Code Overflow Memory corruption Vulnerability

June 30th, 2017

Adobe Reader is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Posted in Uncategorized | Comments (0)

Google Android 7 Qualcomm Obtain Information Vulnerability

June 30th, 2017

Google Android is prone to a gain information vulnerability. This allows local or remote attackers to gain privileges via a malicious program in the affected application

Posted in Uncategorized | Comments (0)

Autodesk Fbx Software Development Kit 2017.0 3DS Execute Code Overflow Vulnerability

June 30th, 2017

Autodesk Fbx Software Development Kit is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Posted in Uncategorized | Comments (0)

Google Android Bypass a restriction or similar Vulnerability

June 30th, 2017

Google Android is prone to a bypass vulnerability. This allow an attacker to bypass detection or blocking system, which could allow malware to pass through the system undetected.

Posted in Uncategorized | Comments (0)

Citrix Xenserver 6.2.0 Linux Remote Code Execution Vulnerability

June 30th, 2017

Authenticated read-only administrator can cancel tasks of other administrators

Posted in Uncategorized | Comments (0)

Libgd 2.2.3 Remote Code Execution Vulnerability

June 30th, 2017

Libgd is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Posted in Uncategorized | Comments (0)