Page 32 of 32 FirstFirst ... 22242526272829303132
Results 776 to 786 of 786
  1. #776
    Thailand Expat
    OhOh's Avatar
    Join Date
    Jul 2010
    Last Online
    13-07-2019 @ 12:24 PM
    Location
    Where troubles melt like lemon drops
    Posts
    17,509
    Quote Originally Posted by harrybarracuda View Post
    You registered to Teakdoor witha real email account?
    Yea a "real email account".

    How many "real email accounts" have you had in the past 20 years?

  2. #777
    disturbance in the Turnip baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 07:20 PM
    Location
    Heidleberg
    Posts
    21,380
    Quote Originally Posted by OhOh View Post
    Yea a "real email account".
    TwistingHarrysTitties@gmail.com ?

  3. #778
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108

  4. #779
    disturbance in the Turnip baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 07:20 PM
    Location
    Heidleberg
    Posts
    21,380
    er ...aol.com

  5. #780
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    Quote Originally Posted by baldrick View Post
    er ...aol.com
    He definitely qualifies as an AOL.


  6. #781
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    Patch! Patch! Patch!

    Two critical vulnerabilities in Microsoft's NTLM authentication protocol consisting of three logical flaws make it possible for attackers to run remote code and authenticate on machines running any Windows version.

    Following Preempt’s responsible disclosure of the vulnerabilities found in NTLM, Microsoft has issued security advisories and patches for the CVE-2019-1040 Windows NTLM Tampering Vulnerability and the CVE-2019-1019 Microsoft Windows Security Feature Bypass Vulnerability as part of the Patch Tuesday updates published today.

    https://www.bleepingcomputer.com/new...o-rce-attacks/





  7. #782
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    Never give your phone to a chinky copper...

    https://medium.com/@fs0c131y/mfsocke...l-58e8850c3de4

  8. #783
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    New MacOS Malware Discovered

    A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.


    A wave of malware targeting MacOS over the past month has raised the profile of the operating system once advertised as much safer than Windows. The newest attack code for the Mac includes three pieces of malware found in June — a zero-day exploit, a package that includes sophisticated anti-detection and obfuscation routines, and a family of malware that uses the Safari browser as an attack surface.

    The zero-day exploit, dubbed
    OSX/Linker by researchers at Intego who discovered it, takes advantage of a vulnerability in MacOS Gatekeeper — the MacOS function that enforces code-signing and has the ability to limit program execution to properly sign code from trusted publishers.


    The
    MacOS X GateKeeper Bypass vuln used in OSX/Linker was first discovered in February 2019 by independent researcher Filippo Cavallarin, who says that he notified Apple of the finding. After a 90-day disclosure deadline passed, Cavallarin publicly disclosed the vulnerability on May 24.

    https://www.darkreading.com/attacks-breaches/new-macos-malware-discovered-/d/d-id/1335135

  9. #784
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    If you want to block chinky, russky and mad mullah spies, you can use these links to add the appropriate rules in your firewall:

    https://lite.ip2location.com/china-ip-address-ranges

    https://lite.ip2location.com/russian...address-ranges

    https://lite.ip2location.com/iran-is...address-ranges

    I would add North Korea but they do all their shit remotely.

  10. #785
    Thailand Expat
    Klondyke's Avatar
    Join Date
    Aug 2014
    Last Online
    Today @ 04:26 PM
    Posts
    4,844
    ^If it is so easy, so why the US election gone so wrong?

  11. #786
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 07:21 PM
    Posts
    59,108
    Fucking chinkies, at it again.


    As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up adverts, cybersecurity researchers warned Wednesday.


    Dubbed Agent Smith, the malware abuses previously-known weaknesses in the Android operating system, making updating to the latest, patched version of Google's operating system a priority, Israeli security company Check Point said.

    Most victims are based in India, where as many as 15 million were infected. But there are more than 300,000 in the U.S., with another 137,000 in the U.K., making this one of the more severe threats to have hit Google's operating system in recent memory.


    The malware has spread via a third party app store 9apps.com, which is
    owned by China’s Alibaba, rather than the official Google Play store. Typically, such non-Google Play attacks focus on developing countries, making the hackers' success in the U.S. and the U.K. more remarkable, Check Point said.


    Whilst the replaced apps will serve up malicious ads, whoever's behind the hacks could do worse, Check Point warned in a blog. "Due to its ability to hide it’s icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user’s device," the researchers wrote.


    They said they’d warned Google and the relevant law enforcement agencies. Google hadn't provided comment at the time of publication.

    Typically the attack works as following: users download an app from the store - typically photo utility, games or adult themed apps (one called Kiss Game: Touch Her Heart is advertised with a cartoon of a man kissing a scantily clad woman). This app then silently installs the malware, disguised as a legitimate Google updating tool. No icon appears for this on the screen, making it even more surreptitious. Legitimate apps - from WhatsApp to the Opera browser and more - are then replaced with an evil update so they serve the bad ads. The researchers said the ads themselves weren't malicious per se. But in a typical ad fraud scheme, every click on an injected advert will send money back to the hackers, as per a typical pay-per-click system.


    There's some indication that the attackers are considering moving to Google Play. The Check Point researchers said they'd found 11 apps on Google's store that contained a "dormant" piece of the hackers software. Google swiftly took those apps down.


    Check Point believes an unnamed Chinese company based in Guangzhou has been building the malware, whilst operating a business that helps Chinese Android developers promote their apps on overseas platforms.


    Alibaba hadn't responded to a request for comment on proliferation of malware on the 9apps platform at the time of publication.

    https://www.forbes.com/sites/thomasbrewster/2019/07/10/25-million-android-phones-infected-with-malware-that-hides-in-whatsapp/#705d465d4470

Thread Information

Users Browsing this Thread

There are currently 2 users browsing this thread. (0 members and 2 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •