Month: July 2017

IndependentSecuriteam

Know your community – Celil ÜNÜVER

Credit to Author: SSD / Maor Schwartz| Date: Mon, 24 Jul 2017 09:57:46 +0000

Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – please meet Celil ÜNÜVER Questions Q: How many years have you been working in the security … Continue reading Know your community – Celil ÜNÜVER

Read More
IndependentSecuriteam

SSD Advisory – Nitro Pro PDF Multiple Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Mon, 24 Jul 2017 05:25:58 +0000

Vulnerabilities Summary The following advisory describes three vulnerabilities found in Nitro / Nitro Pro PDF. Nitro Pro is the PDF reader and editor that does everything you will ever need to do with PDF files. The powerful but snappy editor lets you change PDF documents with ease, and comes with a built-in OCR engine that … Continue reading SSD Advisory – Nitro Pro PDF Multiple Vulnerabilities

Read More
SecuritySophos

5 questions to ask about machine learning

Credit to Author: Anup Ghosh| Date: Mon, 24 Jul 2017 18:08:21 +0000

Machine learning isn’t pixie dust to be spread on products. We look into the nuts, bolts and challenges involved, and how we approach it.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=40719&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/WMoIzoYlPJE” height=”1″ width=”1″ alt=””/>

Read More
MalwareBytesSecurity

Bye, bye Petya! Decryptor for old versions released.

Credit to Author: Malwarebytes Labs| Date: Mon, 24 Jul 2017 17:17:38 +0000

This post shows you how to use the special decryptor for the petya family: Petya, Msicha, and Goldeneye. Not suitable for copycats of these.

Categories:

Tags:

(Read more…)

The post Bye, bye Petya! Decryptor for old versions released. appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (July 17 – July 23)

Credit to Author: Malwarebytes Labs| Date: Mon, 24 Jul 2017 16:41:39 +0000

A compilation of security news and blog posts from the 17th of July to the 23rd. We discuss the recent Dark Web market take downs and lots more.

Categories:

Tags:

(Read more…)

The post A week in security (July 17 – July 23) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Hansa Market on Dark Web seized by Dutch police

Credit to Author: Pieter Arntz| Date: Thu, 20 Jul 2017 17:53:48 +0000

Dutch and US authorities revealed the results of an international cooperation to take down markets on the Dark Web trafficking in drugs, weapons, malware, and stolen data.

Categories:

Tags:

(Read more…)

The post Hansa Market on Dark Web seized by Dutch police appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Beware of these fake apps on Google Play Store that uses ‘Jio/Jeo’ in their names

Credit to Author: Quick Heal Security Labs| Date: Mon, 24 Jul 2017 12:53:52 +0000

fake-apps-that-use-jio-or-jeo-in-their-names-a-technical-analysis-by-quick-heal-security-labs_1fake-apps-that-use-jio-or-jeo-in-their-names-a-technical-analysis-by-quick-heal-security-labsJio took the Indian telecom market by storm when it made its entry with free unlimited calls and data offers. People went into a kind of frenzy for acquiring this service. And with its ‘truly unbelievable’ offers, Jio also launched an array of apps in the Google Play Store such…

The post Beware of these fake apps on Google Play Store that uses ‘Jio/Jeo’ in their names appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
FortinetSecurity

The Need for Threat Intelligence

Credit to Author: Neil Matz| Date: Mon, 24 Jul 2017 12:58:00 +0000

These are challenging times for security leaders. Business pressures require faster processing of more data, and support for more devices than ever before. Critical data that used to be housed in a secured datacenter now moves across an increasingly complex ecosystem of networked environments, including IoT, cloud, mobile devices and workers, and virtualized networks. The rate of change in some environments is so rapid that many organizations simply can’t keep up. A recent Forrester survey of 342 security leaders found that the largest…

Read More