science and technology Silent technical advancement noteworthy in school management software By feedproxy.google.com Published On :: Of course, there are different software vendors in the market to manage administration works of different industries. If you think that school software is chiefly to manage records, process payroll and maintain attendance, then you are... Full Article
science and technology Key Advantages of Building Financial Applications Using HTML5 By feedproxy.google.com Published On :: Before we start, let’s have a brief introduction on HTML5 framework. A HTML5 mobile application is a web page or series of web pages... Full Article
science and technology Tablets PCs Revolutionizing Our Computing Needs By feedproxy.google.com Published On :: From a historical perspective, we started with main frames, then moved on to mini computers and then came the boom of personal computers. These three major developments in computers have defined our computing habits the past few decades.... Full Article
science and technology India now the the third largest smartphone market By feedproxy.google.com Published On :: India has become the 3rd largest smart phone market in the world, having overtaken Japan in Q1 of 2013. China and America occupy the first two positions. Various smartphone manufacturers like Apple, HTC, LG,... Full Article
science and technology The great Indian mobile travel portal revolution By feedproxy.google.com Published On :: There has been an explosion in the usage of mobile phones and smartphones to access travel related websites and portals in India. More and more users are turning to their mobile phones to book tickets for local, national and... Full Article
science and technology Sniffing Out Microphones and Other Bugging Devices Yourself By feedproxy.google.com Published On :: Full Article
science and technology Transform Business Process using Telecom Billing Solution! By feedproxy.google.com Published On :: In the edge of high technology, it is essential to integrate telecom solutions and platforms with CSPs. It can help operators and as well as subscribers too. Billing platform is only the medium among... Full Article
science and technology Social Media Marketing is not Just, Likes and Comments, Why? By feedproxy.google.com Published On :: Full Article
science and technology Telecom Software Helps to Deliver Seamless User Experience, How? By feedproxy.google.com Published On :: In, rapid enhancement of telecommunication industry, it is quite drastic job to deliver right solutions. CSPs aren’t finding the perfect telecom service providers, and so it has become one of... Full Article
science and technology Top Testing Suite: Robust Testing Platform Forever! By feedproxy.google.com Published On :: I was literally confused to deployment testing services and testing scenarios, but thank to my one friend who advised me to use the computaris “top testing suite”. It was the... Full Article
science and technology Toll-free number is a magic wand for SMEs By feedproxy.google.com Published On :: Who doesn’t like to feast on free support and services? The businesses which work on the paradigm of providing ultimate customer satisfaction handle hundreds of calls on a daily basis, including exchange, complaint, inquiry and... Full Article
science and technology July 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 10 Jul 2019 14:17:12 GMT Microsoft addresses vulnerabilities in its July security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1001 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1004 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1062 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1063 - Internet Explorer Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by Internet Explorer. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1092 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1103 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.CVE-2019-1104 - Microsoft Browser Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by Microsoft browsers. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.CVE-2019-1106 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.CVE-2019-1107 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.CVE-2019-1112 - Microsoft Excel Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the disclosure of memory contents by Microsoft Excel. Attackers looking to exploit this vulnerability may host a specially crafted file that contains an exploit to this vulnerability..Read More Full Article
science and technology August 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 14 Aug 2019 09:55:58 GMT Microsoft addresses vulnerabilities in its August security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1196 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1139 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1140 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1141 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1195 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1197 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1201 - Microsoft Word Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Word. Attackers looking to exploit this vulnerability may create a specially crafted file that contains an exploit to this vulnerability..Read More Full Article
science and technology September 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Thu, 12 Sep 2019 15:00:56 GMT Microsoft addresses several vulnerabilities in its September security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1257 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the failure of Microsoft SharePoint to check an application package's source markup. Attackers looking to exploit this vulnerability must find a way to convince a user to open a malicious SharePoint application package.CVE-2019-1295 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API.CVE-2019-1296 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API..Read More Full Article
science and technology October 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 09 Oct 2019 11:42:14 GMT Microsoft addresses several vulnerabilities in its October security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1335 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in Microsoft Edge's Chakra scripting engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1364 - Win32k Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows kernel-mode driver. Attackers looking to exploit this vulnerability must find a way to be logged on to the vulnerable system.CVE-2019-1060 - MS XML Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper parsing of user input by the Microsoft XML Core Services MSXML. Attackers looking to exploit this vulnerability must find a way for a user to access a website using Internet Explorer.CVE-2019-1238 - VBScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1239 - VBScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1307 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1308 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1366 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1361 - Microsoft Graphics Components Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the improper handling of objects in memory by the Microsoft Graphics Components. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file..Read More Full Article
science and technology November 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Tue, 12 Nov 2019 12:06:01 GMT Microsoft addresses several vulnerabilities in its November security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1390 - BScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the VBScript engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1429 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the scripting engine in Internet Explorer. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1359 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.CVE-2019-1358 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.CVE-2019-1311 - Windows Imaging API Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the Windows Imaging API. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted .WIM file..Read More Full Article
science and technology December 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 11 Dec 2019 17:57:43 GMT Microsoft addresses several vulnerabilities in its December security bulletin. Trend Micro Deep Security covers the following:CVE-2019-0617 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the Windows Jet Database engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to open a specially crafted file.CVE-2019-1485 - VBScript Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by VBScript engine. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-0853 - GDI Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Graphics Device Interface (GDI). Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file via file-sharing.CVE-2019-1458 - Win32k Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects by the the Win32k component in Windows. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted application.CVE-2019-1439 - Windows GDI Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the improper handling of objects in memory by the Windows GDI component. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1117 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1118 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1119 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-0959 - Windows Common Log File System Driver Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows Common Log File System. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted application..Read More Full Article
science and technology January 2020 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Tue, 14 Jan 2020 15:38:30 GMT Microsoft addresses several vulnerabilities in its January security bulletin. Trend Micro Deep Security covers the following:CVE-2020-0609 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.CVE-2020-0610 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.CVE-2020-0652 - Microsoft Office Memory Corruption VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects by Microsoft Office. Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file.CVE-2020-0601 - Windows CryptoAPI Spoofing VulnerabilityRisk Rating: ImportantThis spoofing vulnerability exists in the validation of Elliptic Curve Cryptography (ECC) certificates by the the Windows CryptoAPI (crypt32.dll). A successful exploitation of this vulnerability could allow man-in-the-middle (MiTM) attacks..Read More Full Article
science and technology February 2020 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 12 Feb 2020 11:08:35 GMT Microsoft addresses several vulnerabilities in its February security bulletin. Trend Micro Deep Security covers the following:CVE-2020-0674 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the scripting engine of Internet explorer in the way it handles objects in memory. Attackers looking to exploit this vulnerability could host a specially crafted website that contains an exploit.CVE-2020-0681 - Remote Desktop Client Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the Windows Remote Desktop Client. It exists when a user connects to a malicious server. Attackers looking to exploit this vulnerability could find ways to convince a user of a vulnerable machine to connect to a malicious server.CVE-2020-0692 - Microsoft Exchange Server Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability, that requires an enabled Exchange Web Services (EWS), exists in the Microsoft Exchange Server. Attackers looking to exploit this vulnerability must find a way to change Security Access Token parameters and forward that to the vulnerable Microsoft Exchange Server..Read More Full Article
science and technology Warning: PPE - essential against COVID-19 - poses serious risk of skin injury By Published On :: Sun, 03 May 2020 05:20:00 +0530 Around 42.8 percent experienced serious skin injury related to the use of personal protective equipment (PPE), including masks, goggles, face shields, and protective gowns, a study has shown. Full Article
science and technology Undercover robot captures footage of gorillas singing before dinner (VIDEO) By Published On :: Sun, 03 May 2020 17:21:32 +0530 The robotic undercover agent was made in such a way that it could replicate all basic mannerisms of a real-life gorilla. Full Article
science and technology Coronavirus will not 'just disappear', pathogen is not deliberately manipulated: Anthony Fauci By Published On :: Tue, 05 May 2020 20:03:53 +0530 The coronavirus that originated from Wuhan, China has already claimed the lives of more than 253,230 people worldwide. Full Article
science and technology Alien life could exist in these atmospheric conditions: Expands researchers' scope By Published On :: Tue, 05 May 2020 21:44:03 +0530 The growth and reproduction of yeast and E.coli suggests that alien life could be thriving in some giant exoplanets. Full Article
science and technology New deadly mutation of coronavirus requires urgent attention, warns study By Published On :: Wed, 06 May 2020 12:28:41 +0530 The study report suggested that this mutated pathogen seems to have replaced the original coronavirus that originated in Wuhan. Full Article
science and technology From Mahesh Babu, Pawan Kalyan to Arjun Kapoor: Indian celebrities react to the shocking Vizag gas leak By Published On :: Thu, 07 May 2020 14:52:35 +0530 The Vizag gas leak which took place last night has left over 5000 people sick. The tragedy has left the country shocked, and celebrities have taken to social media to show solidarity with the people of Vizag. Full Article
science and technology Researchers discover giant Ice Age sloths that walked in two legs By Published On :: Thu, 07 May 2020 18:46:49 +0530 Unlike elephants, these giant ice age sloths roamed across the earth's surface in two legs around 20,000 years ago. Full Article
science and technology Apple is addressing the biggest pain-point of iPhone users during COVID-19 By Published On :: Sat, 02 May 2020 01:05:34 +0530 Apple is soon going to roll out a new software that addresses the pain-point of iPhone users in wake of COVID-19 pandemic. Full Article
science and technology OnePlus users rejoice: Here are five exciting features coming your way By Published On :: Sat, 02 May 2020 02:52:43 +0530 From Always on Display to sending a notification when the phone is fully charged, here are five community-inspired features coming to OnePlus smartphones. Full Article
science and technology After Facebook, Silver Lake to invest Rs 5,655 crore in Reliance Jio Platforms By Published On :: Mon, 04 May 2020 10:45:41 +0530 Facebook last month poured in Rs 43,574 crore for a 9.99 per cent stake in India's oil-retail-telecom conglomerate-led Jio Platforms -- the largest investment for a minority stake by a tech giant. Full Article
science and technology Xiaomi Mi 10 price in India tipped ahead of May 8 launch: Specs, features & more By Published On :: Mon, 04 May 2020 18:12:34 +0530 Xiaomi has announced that it will launch the Mi 10 in India on May 8 and here's everything you need to know about the phone. Full Article
science and technology Huawei is bringing new premium mid-range smartphone to India; could be under Rs 20,000 By Published On :: Mon, 04 May 2020 20:43:45 +0530 Huawei lists new smartphone on its India site, hinting at an imminent arrival of Huawei Y9s in the country. Full Article
science and technology Apple-Google's contact-tracing system upholds user-privacy; bans location tracking By Published On :: Tue, 05 May 2020 02:15:32 +0530 Apple and Google's contact tracing system won't allow apps built using its API to use location services in smartphones, addressing some concerns privacy experts might have. Full Article
science and technology Ethical hacker discovers 'security issue' in Aarogya Setu: Centre downplays risks By Published On :: Wed, 06 May 2020 01:14:09 +0530 If the tweet by the French hacker is to be believed, the privacy of more than 90 million Indians is at stake. The issue has been revealed to the concerned departments as the ethical hacker waits for it to be resolved. Full Article
science and technology Digital India: 14% of India's active Internet users in 5-11 age group By Published On :: Wed, 06 May 2020 07:07:00 +0530 According to the latest statistics, more and more users are getting online, but there's a large chuck in the rural areas that hasn't been exposed to the internet. Full Article
science and technology Amazon Prime subscribers get special gaming benefits in India: Details here By Published On :: Wed, 06 May 2020 22:10:26 +0530 Amazon Prime subscribers in India get exclusive gaming benefits, which grants free access to some interesting mobile games. Full Article
science and technology Mukesh Ambani's fake Twitter account gains thousands of followers in days By Published On :: Thu, 07 May 2020 22:33:31 +0530 A fake account of Mukesh Ambani on Twitter has gained thousands of followers in a matter of days. Here's how we spotted the fake account. Full Article
science and technology Backdoor.Perl.SHELLBOT.AB By www.trendmicro.com Published On :: Thu, 13 Jun 2019 00:00:00 GMT Over All Risk Rating : LowThis backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.This Backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.Read More Full Article
science and technology Ransom.MSIL.FREEZING.A By www.trendmicro.com Published On :: Thu, 27 Jun 2019 00:00:00 GMT Over All Risk Rating : LowThis ransomware is one of the few ransomware families that is loaded and executed under the legitimate PowerShell executable. It also is one of the few that uses restart session manager to terminate processes that have associated files it tries to encrypt.This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.Read More Full Article
science and technology Backdoor.Linux.MIRAI.VWIQT By www.trendmicro.com Published On :: Tue, 09 Jul 2019 00:00:00 GMT Over All Risk Rating : LowIoT malware uses two different encryption routines for its strings and modified the magic number of UPX.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
science and technology Backdoor.Perl.SHELLBOT.D By www.trendmicro.com Published On :: Fri, 19 Jul 2019 00:00:00 GMT Over All Risk Rating : LowThis backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.Read More Full Article
science and technology ELF_SETAG.SM By www.trendmicro.com Published On :: Tue, 23 Jul 2019 00:00:00 GMT Over All Risk Rating : LowThis malware is part of an attack chain that involves searching for exposed or publicly accessible Elasticsearch databases/servers. The malware would invoke a shell with an attacker-crafted search query with encoded Java commands.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Read More Full Article
science and technology Backdoor.Linux.BASHLITE.SMJC2 By www.trendmicro.com Published On :: Mon, 19 Aug 2019 00:00:00 GMT Over All Risk Rating : LowThis backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
science and technology Coinminer.Win64.MALXMR.TIAOODBZ By www.trendmicro.com Published On :: Mon, 16 Sep 2019 00:00:00 GMT Over All Risk Rating : LowThis miner figured in the fileless GhostMiner that uses WMI Objects. GhostMiner is known to kill competing other miner payloads.This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.Read More Full Article
science and technology Rootkit.Linux.SKIDMAP.A By www.trendmicro.com Published On :: Mon, 16 Sep 2019 00:00:00 GMT Over All Risk Rating : LowThis rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Read More Full Article
science and technology Trojan.JS.KOVCOREG.A By www.trendmicro.com Published On :: Tue, 01 Oct 2019 00:00:00 GMT Over All Risk Rating : LowThis malware is part of the fileless botnet Novter distributed by the KovCoreG malvertising campaign.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.Read More Full Article
science and technology Trojan.JS.NODSTER.A By www.trendmicro.com Published On :: Tue, 01 Oct 2019 00:00:00 GMT Over All Risk Rating : LowThis malware is part of the fileless botnet Novter that is delivered via the KovCoreG malvertising campaign.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.Read More Full Article
science and technology Trojan.SH.KERBERDS.A By www.trendmicro.com Published On :: Fri, 25 Oct 2019 00:00:00 GMT Over All Risk Rating : LowThis new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Read More Full Article
science and technology Coinminer.Linux.KERBERDS.A By www.trendmicro.com Published On :: Mon, 04 Nov 2019 00:00:00 GMT Over All Risk Rating : LowThis new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks. This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.Read More Full Article
science and technology Backdoor.MSIL.REMCOS.AOJ By www.trendmicro.com Published On :: Tue, 19 Nov 2019 00:00:00 GMT Over All Risk Rating : LowThis malware was seen delivered via malicious spam spoofing the brand DHL as the sender. It came as an .ISO attachment. It possibly is used for spearphishing activities.This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
science and technology Backdoor.Win64.ANCHOR.A By www.trendmicro.com Published On :: Thu, 09 Jan 2020 00:00:00 GMT Over All Risk Rating : LowThis is the Trend Micro detection for the backdoor installed by the PowerTrick post-exploitation toolkit believed to be developed by creators of Trickbot.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.Read More Full Article