ni

nia-68.zip

DECnet, UNIX UUCP files, VAX - Tekno DCS help,




ni

nia-66.zip

CERT Advisory - VAX/VMS Breakins




ni

BIND Comes Apart Thanks To Ancient Denial Of Service Vuln




ni

Pisay Online E-Learning System 1.0 SQL Injection / Code Execution

Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities.





ni

Brain Hack Devices Must Be Scrutinized, Say Top Scientists




ni

First Clinical Trial Of Gene Editing To Help Target Cancer












ni

At Least 77 Killed In Nice, France Terror Attack





ni

Air Contacts Lite Denial Of Service

The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability.




ni

Zero Day Initiative Advisory 11-109

Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone.




ni

Secunia Security Advisory 43832

Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device.




ni

Secunia Security Advisory 44154

Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device.




ni

Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service

Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability.







ni

Extreme Networks Aerohive HiveOS 11.x Denial Of Service

Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface.




ni

Canonical GitHub Account Hacked, Ubuntu Source Code Safe





ni

ChronIC RF Hacking Tool

ChronIC is the Chronos Integrated Commander, a wearable Sub-GHz RF hacking tool. Written in python.




ni

Teltonika RUT9XX Unauthenticated OS Command Injection

Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.




ni

Teltonika RUT9XX Reflected Cross Site Scripting

Teltonika RUT9XX routers with firmware before 00.05.01.1 are prone to cross site scripting vulnerabilities in hotspotlogin.cgi due to insufficient user input sanitization.




ni

Telus Actiontec WEB6000Q Denial Of Service

Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a denial of service vulnerability. By querying CGI endpoints with empty (GET/POST/HEAD) requests causes a Segmentation Fault of the uhttpd webserver. Since there is no watchdog on this daemon, a device reboot is needed to restart the webserver to make any modification to the device.




ni

Rifatron Intelligent Digital Security System (animate.cgi) Stream Disclosure

The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module.




ni

View from Asia: imagining the worst

What if the coronavirus lasts until the end of the year? Lawrence Yeo has a bleak forecast.












ni

Iranian Internet Attacked Saturday, Knocked Partially Offline





ni

How to Recognize a Suspicious Email


As champions of National Cyber Security Awareness Month (NCSAM), we're kicking off our first week with a focus on email. Read on for facts and tips on email security from the National Cyber Security Alliance.

Across the world, 269 billion emails are sent every day. It's estimated that the average business user will receive 96 emails per day by 2019 (source: Radicati).

Given our reliance on the medium, it's no surprise that email is one of cybercriminals' favorite methods of attack. According to the National Cyber Security Alliance, 85 percent of U.S. organizations have experienced a phishing attack and 30 percent of people have opened a phishing email.

There are simple steps you can take to ensure that you don't become a victim of a cyberattack. Somewhat like a poker tell, suspicious emails contain hints that the sender isn't who they claim to be.

Watch this video to learn how to spot email scams.

The Facts About Email Scams

  • Suspicious emails engage in "spoofing," a type of scam in which attackers impersonate a trustworthy entity to make it more likely that the recipient will open and act on the email.
  • Spoofed emails typically employ one of two tactics:
    • Phishing, the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons.
    • Spreading malware by getting the user to open malicious email attachments or click on malicious links.

Practical Tips on Spotting Suspicious Emails

  • Look carefully at the email and ask yourself the following questions:
    • Do you know or recognize the "from" address or contact's name?
    • Does the message contain incorrect grammar or misspelled words?
    • Does the message ask you to take action on something you didn't request, such as "click on this link to pick the new phone you requested"?
  • If the answer to the first is no, or the answer to the second or third above is yes:
    • Don't click on links. Instead, hover your cursor over links to determine if the address is unknown, suspicious, or misleading: for example, www.microsoft.com.maliciousdomain.it. Don't open any attachments the email contains.
    • If you suspect a work email is a phishing attack, immediately report it to your IT administrator so they can alert your fellow coworkers of the attempted attack. If it's a personal email, most email service providers provide a mechanism to report that. Check out this example from Gmail.

Additional Cybersecurity Resources

  • Want to learn more about cybersecurity and how you can keep your data safe? Read our latest blog post about the Equifax breach.
  • Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens.
  • Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.

Image: National Cyber Security Alliance




ni

Egypt planning minister strives for sustainable economic growth

Egypt is well on the way to establishing a diversified economy, claims Hala El Saeed, minister of planning and economic development 




ni

Tanzanian tourism boom undermined by investor concerns

Tanzania's economy is booming and its tourism sector is thriving. However, concerns about the president's strong-arm tactics and delays in the completion of key infrastructure projects are threatening this growth.