Description: BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND...
Read More
Description: BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully...
Read More
Bangladesh Computer Council (BCC) is taking necessary measures to improve Bangladesh’s capability to manage the risks related to digital revolution and deal with fast growing cybercrime. Bangladesh e-Government Computer Incident Response Team (BGD e-GOV CIRT) was established at BCC under the project “Leveraging ICT for Growth, Employment and Governance Project (LICT)”. What is BGD e-GOV CIRT? The Computer Incident Response Team (CIRT) investigates and resolves...
Read More
Google has yet to remove two apps infected with dangerous malware that are currently still available for download via the official Google Play Store. The apps are named “Earn Real Money Gift Cards” — an app for winning gift cards by installing other apps on your phone — and “Bubble Shooter Wild Life” — a mobile game. Both apps were developed and recently uploaded on...
Read More
From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you have any posts discussing the risk to banks when people use their cell phone inside them, ignoring the security guards?” We think this is a very interesting question and one...
Read More
USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information “leakage,” making them even less secure than has been thought. Researchers tested more than 50 different computers and external USB hubs and found that over 90 percent of them leaked information to an external USB device.
Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from Ben-Gurion University of the Negev has demonstrated that hardware replacements – e.g. touchscreens, NFC readers, wireless charging controllers, and so on – can be equipped with a chip that is capable of manipulating the device’s...
Read More
DDoS attacks rose again in Q2 for the first time in almost a year as the black hats returned to tried-and-tested tools and techniques including PBot, Mirai and Domain Generation Algorithms (DGA), according to Akamai. The cloud delivery provider crunched data collected from over 230,000 servers in more than 1600 networks to compile its State of the Internet/Security Report for Q2 2017.
An editor used by millions of game developers and coding students around the world contains a remote code execution vulnerability in all of its Windows versions on all versions of Windows. The Mac version of the editor is not affected.
Is that music tracking you? Hackers can remotely hijack smart devices and use SONAR to record your every move The CovertBand system can determine the position of objects using sonar It sends out a repeating pulse of sound waves in the 18 to 20 kHz range Devices were hacked to play music with pulses to track someone’s position It uses the device’s built-in microphones to...
Read More