D-Link Security Updates Fixed Multiple Vulnerabilities in WiFiManager Software

Haythem Elmir

D-Link Security Updates fixed vulnerabilities with Central WiFiManager Software Controller that allows an attacker to execute the code remotely with system permissions. The vulnerabilities were discovered by Core Security Consulting Services and these vulnerabilities directly impact the software package and put the host computer at risk. The Central WiFiManager Software […]

Windows 10 : arrêtez tout ! La mise à jour d’octobre effacerait les données personnelles !

Haythem Elmir

L’édition « October 2018 Update » de Windows 10, déployée cette semaine par Microsoft, serait victime d’un énorme bug : la mise à jour supprimerait purement et simplement les données personnelles des utilisateurs. Disponible depuis quelques jours, la nouvelle édition de Windows 10 fait décidément beaucoup parler d’elle, et pas nécessairement en […]

ThreatList: 83% of Routers Contain Vulnerable Code

Haythem Elmir

Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities. A staggering 83 percent of home and office routers have vulnerabilities that could be exploited by attackers. Of those vulnerable, over a quarter harbor high-risk and critical vulnerabilities, according to a report released […]

Instagram Influencers Targeted in Ransomware Campaign

Haythem Elmir

The company does not have two-factor authentication set by default High-profile accounts on Instagram are being targeted by phishing and ransomware attacks, with evidence that many are paying the attackers. Hackers are gaining access to accounts via phishing scams; posing as personal representatives from well known branding companies, they are […]

Mozilla Releases Critical Security Update For Thunderbird

Haythem Elmir

Mozilla releases security updates for Thunderbird that fixes one critical vulnerability, two high-level vulnerabilities, and three medium level vulnerabilities. Critical vulnerability CVE-2018-12376: Memory corruption issue that may allow an attacker to run arbitrary code on the vulnerable machine. The Vulnerability has a critical impact. High-level Vulnerability CVE-2018-12378: Use-after-free vulnerability occur […]