In last two years major security bugs have been found and patched which might had affected innumerous users and servers. On 28th October 2014, HD […]
Tag: vulnerability
Security 101-How Can You Protect Your Website from Hacking?
Samsung Galaxy SII and SIII: Prone to a New Security Vulnerability
In a recent demonstration by a security researcher, it was found out that Samsung Galaxy SII and SIII smart phones were vulnerable to being remotely wiped off their memory. In this regard, for the owners of these devices the precursor is here, you may want to watch your ways, especially when opening internet links that you receive through QR, NFC or Push messages.How does that work?
The malicious code as discussed above can be made use of in order to trigger the factory reset for the Galaxy SIII device. If the code is embedded in a single frame it will automatically lead a factory reset that does not have to be initiated by the user. Nonetheless, merely browsing a website with the embedded code does not result in triggering the reset, rather opening it through NFC, WAP Push SMS or QR does. As soon as the website link in the message opens, the wipe is started.
The techie take
Some techie responded rather optimistically to the news and thought that the weakness would not do much damage. The underlying argument was that many hackers will not go into frenzy over wiping a few phones, considering many consumers use Cloud Backups with their devices and it will be an exercise in futility as the users will simply be able to reverse the oh-so clever move. Still, the concern was that is there anything more that can come out from this exploit, because if there is than not opening a link that you didn’t call for would be a better idea.
The company’s response
Following the entire kerfuffle over the issue, Samsung finally responded and claimed that the issue was resolved. A spokesperson from the South Korean company explained that the vulnerability was now patched but failed to mention when exactly was it fixed and which version of the software was secure for now.
All that was given out was an assurance to the consumers that the recently discovered security weakness concerning Galaxy SIII was patched through a software update, recommending all the users of this device to download the latest software update. It can be done simply and rapidly using the over the air service, according to the company.
While that might be a reason for Galaxy SIII owners to sleep well at nights, what about the ones with other smart phones, the SII inclusive. According to the rumors the problem stemmed out from the TouchWiz UI as opposed to merely the Galaxy SIII. Well, the company has not responded in this vein, so for now, the Galaxy SIII users who feel reassured can sleep well and others can, perhaps take pill or go on trying to dodge the bullets of this demon as they do Android spy apps, mobile spy software and the like.
Author Bio: James Clark has been in the business of providing quality information on cell phone monitoring for a while now. He's an expert at all things spyware, but his main forte is iPhone spyware which has captured the interest of many.
IT Security Threats for 2011 by McAfee
2011 will be much like 2010 when it comes to IT security threats, only more so.
“We are seeing an escalating threat landscape in 2011,” says Dmitri Alperovitch, threat research vice president at McAfee Labs, which Tuesday issued its annual threat predictions for the coming year.
In an interview with Information Security Media Group, Alperovitch explains the challenges these threat present and how individuals and organizations can address them. The threats McAfee Labs identifies for 2011 are:
Internet Explorer is found vulnerable again
A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a use-after-free error within the “mshtml.dll” library when processing a web page referencing a CSS (Cascading Style Sheets) file that includes various “@import” rules, which could allow remote attackers to execute arbitrary code via a specially crafted web page.