ca FLIR Systems FLIR Brickstream 3D+ Unauthenticated Config Download File Disclosure By packetstormsecurity.com Published On :: Mon, 15 Oct 2018 16:58:29 GMT The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated config download and file disclosure vulnerability when calling the ExportConfig REST API (getConfigExportFile.cgi). This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and/or full system access. Full Article
ca Synaccess netBooter NP-02x / NP-08x 6.8 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 19 Nov 2018 19:09:21 GMT Synaccess netBooter NP-02x and NP-08x version 6.8 suffer from an authentication bypass vulnerability due to a missing control check when calling the webNewAcct.cgi script while creating users. This allows an unauthenticated attacker to create an admin user account and bypass authentication giving her the power to turn off a power supply to a resource. Full Article
ca ABB IDAL HTTP Server Authentication Bypass By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 20:32:22 GMT The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string 'IDALToken=......' in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart. Full Article
ca D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
ca A green future for Cape Town’s Atlantis By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:10 +0000 Atlantis in South Africa has a new SEZ focused on green manufacturing, which is hoping to turn around the area's fortunes. Annie Hessler reports. Full Article
ca Htcap Analysis Tool 1.1.0 By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 18:01:38 GMT Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs. Full Article
ca Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group's Servers By packetstormsecurity.com Published On :: Thu, 20 Jun 2019 17:00:59 GMT Full Article headline hacker government russia cyberwar iran
ca Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 14:22:25 GMT Full Article headline hacker government microsoft usa fraud cyberwar iran
ca How Many Microsoft Products Can My Nonprofit Request from TechSoup? By feeds.techsoup.org Published On :: Wed, 20 Sep 2017 23:30:00 GMT https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions. See Microsoft products What do you mean by "each kind of product"? The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac. You can get products from 10 title groups in your two-year cycle. When does this two-year cycle start and end? Is it the calendar year? No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page. Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product? That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups. What are the exceptions you mentioned? They have to do with servers. Microsoft offers two licensing models for its server products. Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server. Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five. A lot of the title groups are for CALs and MLs. What are the limits for these? You can get 50 from each title group. CALs, or client access licenses, give you access to a server from a device like your desktop computer. MLs, or management licenses, let your device be managed by a management server. Where can I find out more? This article goes into a lot more detail and gives examples of how the various allotments work together. spanhidden Full Article microsoft
ca How Can a Museum Best Protect Its Assets? By feeds.techsoup.org Published On :: Tue, 03 Oct 2017 14:03:00 GMT In this age of increasing hacks and cybercrime, the Norman Rockwell Museum has a lot of digital assets, museum operations data, and private patron data that need to be protected. Find out why Frank Kennedy, IT manager at the Rockwell museum, chose Veritas Backup Exec to be a key part of the museum's security strategy. About the Museum Norman Rockwell is one of the great iconic painters and illustrators of American life in the 20th century. His hundreds of covers for the Saturday Evening Post magazine alone are a national treasure. The Norman Rockwell Museum is located in Stockbridge, Massachusetts, where Rockwell spent the last part of his celebrated life. The museum started two years before Rockwell's death in 1978 and houses over 100,000 of his works and also those of other illustrators. The museum now has 140,000 annual visitors, and 220,000 people view its traveling exhibitions each year. It also has an active website with more than 600,000 worldwide unique visitors per year. The Museum's IT System IT Manager Frank Kennedy is an IT department of one (plus an occasional contractor). He supports 90 staff and volunteers and is responsible for critical information security and data protection for the museum. The museum's IT network consists of several large physical servers and many single-purpose virtual machines. The single-purpose virtual machines allow for emergency service without disrupting other departments. Frank says, "Most of our enterprise software is procured via TechSoup, which makes it affordable to license so many servers! We do not have to make do with weak, low-budget software." Digital Assets: Preserving Art over the Long Term Frank Kennedy explains that digital assets are of increasing importance in the work of museums. There are high-resolution images or copies of art works that must be carefully stored to preserve work in its best condition. He says that digital versions are often irreplaceable, as when the original object is disintegrating or would be damaged by further handling. The digital versions keep a faithful record of the art in its best state. The most sensitive objects of this museum include a collection of Rockwell's cellulose nitrate film negatives, which deteriorate over time. The museum also has analog audio and video tape and motion picture film that deteriorates, as well as works on paper that degrade with exposure to light. Other crucial data for the museum includes databases for collection management, point of sale records, donor management, and email. Frank's backup system is designed to be redundant on purpose. He says, "Protecting this data means keeping many copies in many places. Doing so becomes a big challenge when the size of the data becomes several terabytes. I use many layers of redundancy." The Backup Crisis As the museum's data got bigger and bigger, and server patches piled on, the museum's previous backup solution eventually became unstable. Frank reports that his backups were failing constantly and causing him stress in his careful, risk-based management approach. When he first went to get a new backup solution from TechSoup, he discovered that what he needed was not available. He says, "The cost for the options I use would have been over $4,000 per year, unbudgeted. TechSoup responded to users' desperate cry and worked with Veritas to bring Backup Exec back to TechSoup! I can't even describe my relief. Veritas Backup Exec is better than ever. It is so stable that I get suspicious and have to go look just to be sure it's really working!" Why the Norman Rockwell Museum Chose Backup Exec over Other Options Frank told me that the license he gets from TechSoup includes every option his museum needs. These options and features include Exchange Server backup Unlimited media server backups Unlimited agents for specific applications like VMware, Windows, Linux, and so on Simplified disaster recovery Protection against accidental deletion, damage, or overwriting Storing backups to disk, network share, tape (any type), or cloud — or all four at once Virtual machine snapshots that are viewable directly from the host's agent A deduplication engine so backed-up data is as clean as possible Backup retention periods that can be defined per job and per media server An excellent graphical user interface The status of every backed-up resource available at a glance Sending an email to the admin when anything goes wrong Running several jobs simultaneously (depending on server horsepower) Advice for Museums and Other Organizations Considering Veritas Backup Exec Backup Exec is powerful software geared toward backing up an entire network. It requires some study to do the installation and learn the software. You don't get phone support with the charity licensing, so you need to be comfortable Googling for answers and working in the Veritas community support forum. Frank recommends dedicating a strong server for running the software. He likes eight cores and 32 GB of RAM; hot-swappable, hot-growable RAID-5; fast network connectivity; and a very large uninterruptible power supply (UPS). Avoid the temptation to install other services or applications on what seems to be a machine that is often idle. In a Nutshell Frank's experience is that "Veritas Backup Exec is the best, most reliable, most flexible, and versatile backup software you can get. Commit the needed resources to operate it, and you will be rewarded with peace of mind and business continuity. Your donors will be pleased that you are protecting their investment so carefully." Image: Norman Rockwell Museum / All rights reserved / Used with permission spanhidden Full Article security veritas museumorhistoricalorg backupandrestore
ca Investors mobilise $40bn for African infrastructure By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:47:13 +0000 Twenty-five countries attracted high-ticket investment deals at the Africa Investment Forum Full Article
ca EBRD president looks to African expansion By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:14 +0000 The EU is considering a broader mandate for the EBRD, and its president, Sir Suma Chakrabarti, believes its model would work in sub-Saharan Africa. Full Article
ca View from the Middle East & Africa: small steps can have a big impact on tourism By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:06 +0000 Poor infrastructure and political instability deter tourism, but small and manageable steps to avoid chaos and promote hospitality can work wonders. Full Article
ca Will mobile phone penetration maintain African momentum? By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:20:18 +0000 Sub-Saharan Africa is the world’s fastest growing mobile phone market, but how can telecoms companies make the most of the huge opportunities the region provides? Full Article
ca View from Middle East and Africa: SDGs need rich to support the poor By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:27 +0000 The UN Sustainable Development Goals aim to end global poverty, but poorer countries are struggling to hit them. More help from richer countries is crucial, writes Mazdak Rafaty. Full Article
ca How the Suez Canal Economic Zone is aiding Egypt's economic resurgence By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:41 +0000 Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. Full Article
ca Tupperware Site Hacked With Credit Card Skimmer By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:39:07 GMT Full Article headline hacker bank cybercrime fraud
ca A Twitch Streamer Is Exposing Coronavirus Scams Live By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:46 GMT Full Article headline virus fraud
ca Best Buy Gift Cards, USB Drive Used To Spread Infostealer By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:50 GMT Full Article headline malware fraud
ca Google Blocked 126 Million COVID-19 Phishing Scams In One Week By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:41 GMT Full Article headline email virus cybercrime fraud google phish
ca Shade Threat Actors Call It Quits, Release 750k Encryption Keys By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:53 GMT Full Article headline hacker malware cybercrime fraud password cryptography
ca Scam Coronavirus Sites Selling Fake Cures Taken Down By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:14:04 GMT Full Article headline virus cybercrime fraud science
ca Hackers Turned Virginia Government Sites Into eBook Scam By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:04 GMT Full Article headline hacker government usa fraud
ca Favicons Found Housing Credit Card Skimming Malware By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:15 GMT Full Article headline malware bank cybercrime fraud
ca Blue Mockingbird Monero-Mining Campaign Exploits Web Apps By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:17 GMT Full Article headline malware fraud cryptography
ca US-Iran feud casts new investment shadow over Middle East By www.fdiintelligence.com Published On :: Thu, 09 Jan 2020 12:53:15 +0000 FDI levels have already fallen throughout Iran's main sphere of influence in the region. Full Article
ca Emerging markets predicted to spearhead GDP growth over next decade By www.fdiintelligence.com Published On :: Tue, 14 Jan 2020 11:24:32 +0000 Lower fertility rates will boost economic growth, according to a demographic model developed by Renaissance Capital. Full Article
ca India invites foreign capital By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 10:41:47 +0000 India’s 2020 budget continues the process of opening up to overseas investment. Full Article
ca fDi Index: investors carried weak sentiment into January as coronavirus threat emerged By www.fdiintelligence.com Published On :: Thu, 12 Mar 2020 10:56:11 +0000 Announced greenfield projects into China plummeted in early 2020 with the US and Europe taking the lion's share of global foreign investment. Full Article
ca UK strengthens ties to Africa By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 11:25:25 +0000 London event hears how the UK export credit agency is increasing its focus on trade with African countries. Jason Mitchell reports. Full Article
ca WhatWeb Scanner 0.5.0 By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 13:11:29 GMT WhatWeb is a next-generation web scanner. WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability. Full Article
ca WhatWeb Scanner 0.5.1 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:24:44 GMT WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability. Full Article
ca Emerging APT Mounts Mass iPhone Surveillance Campaign By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 12:52:59 GMT Full Article headline malware phone spyware apple
ca Global COVID-19 Apps Suffering From Flaws, Malicious Copycats By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:20 GMT Full Article headline malware virus phone spyware
ca PhantomLance Spying Campaign Breaches Google Play By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:42 GMT Full Article headline privacy malware phone google spyware
ca A Private Spy Was Caught Using A Hacking Tool To Target Their Crush By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:43 GMT Full Article headline hacker privacy phone israel spyware
ca Kuwait pins hopes on diversification with Vision 2035 By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:16 +0000 Kuwait's National Vision 2035 has economic diversification at its heart. This move from hydrocarbon reliance to other sectors is attracting investor attention, as Wendy Atkins reports. Full Article
ca View from Europe: will European investment go local? By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:13 +0000 Long-dominant global supply chains look less tenable in the light of pressures ranging from pandemics to disasters, trade tensions and protectionism. Full Article
ca Dublin tops European HQ location rankings By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:08 +0000 The UK is the top country, but Dublin is leading city, for foreign companies setting up headquarters in Europe, according to fDi’s ranking. Full Article
ca Global pharmaceutical FDI on an upward trend By www.fdiintelligence.com Published On :: Tue, 31 Mar 2020 16:24:03 +0000 The global pharmaceutical sector has seen consistent growth since 2014, with western Europe a major beneficiary. Full Article
ca A European draw: Eco Equity breaks new ground in medicinal cannabis By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:02 +0000 Eco Equity is one of only a few Europe-based investors in medicinal cannabis from Africa and the Caribbean, an area in which the UK is missing an opportunity, according to CEO Jon-Paul Doran. Full Article
ca View from Middle East and Africa: UAE moves fast to combat Covid-19 By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:01 +0000 The UAE followed Singapore’s swift reaction to combat Covid-19, to preserve the health of its citizens. Now moves are in place to tackle the country’s economic wellbeing. Full Article
ca View from the Americas: new perspectives in a time of pandemic By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:03:51 +0000 The coronavirus pandemic could change human behaviour more permanently in future. Full Article
ca Latin America prepares for sharp drop in FDI amid coronavirus pandemic By www.fdiintelligence.com Published On :: Wed, 08 Apr 2020 12:03:41 +0000 The fallout from the pandemic looks set to stall trade and investment to Latin America. Full Article
ca Mara's Phones makes African manufacturing a priority By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:24 +0000 Having opened new production facilities in Rwanda and South Africa, Mara Phones is looking to alter Africa's mindset from being a 'consumer' to being a 'manufacturer'. Full Article
ca Reforms could unlock African development, reports McKinsey By www.fdiintelligence.com Published On :: Mon, 11 Nov 2019 10:34:15 +0000 Continued African development could hinge on public finance reforms. Full Article
ca Passion Capital partner puts faith in London fintech scene By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:12 +0000 Passion Capital's Eileen Burbidge talks to fDi about what fintech companies should consider when expanding internationally, and why London will always be a key market in the sector. Full Article
ca Group effort helps The Fresh Market stay local By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:20 +0000 Financial incentives from two different cities persuaded US grocery chain The Fresh Market to stay headquartered in its home state of North Carolina. Full Article
ca AstraZeneca expands further into China’s biotech sector By www.fdiintelligence.com Published On :: Mon, 18 Nov 2019 10:44:42 +0000 AstraZeneca will set up a R&D centre and an AI innovation centre in Shanghai, as well as create a $1bn fund that would invest in healthcare start-ups. Full Article
ca Red Hat Hack Prompts Critical OpenSSH Update By packetstormsecurity.com Published On :: Fri, 22 Aug 2008 10:17:11 GMT Full Article linux ssh