TECHNOBABBLE

TECHNOLOGY | SECURITY | NEWS

Is your home router being used to attack WordPress sites?

Last week the good folks at Wordfence noticed something very interesting while compiling their monthly attack report. Algeria had raced from 60th place in their “Top Attacking Countries” list, to 24th place. That is obviously a huge jump in a very short time. Upon closer review, they realized that more than 10,000 IP addresses originating in Algeria were attacking WordPress…

More than 100,000 WordPress sites hacked via REST API zero-day

WordPress was updated on January 26th to patch three separate security vulnerabilities. At the time, the folks at WordPress advised that you should update immediately which is fairly normal (and recommended). What you may not know, is that a fourth vulnerability was kept private for several weeks. Why wasn’t it publicized? Security through obscurity. An unauthenticated privilege escalation vulnerability was found in a…

Mossack Fonseca Breach Caused by Outdated WordPress Plugin, Slider Revolution

Early this morning Wordfence released information from a security audit performed after the Mossack Fonseca breach that points to an outdated plugin on the firm’s WordPress site as the likely attack vector.   Mossack Fonseca had been running a horribly out of date version of the Slider Revolution plugin for WordPress, created by ThemePunch. They further detailed how the intruder may have then been able to move from WordPress to an…

How to prevent WINMAIL.DAT attachments in Exchange Online by disabling TNEF

I’ve run into this problem a handful of times over the last few years. An Exchange user sends and e-mail with attachment(s) to a non-Exchange user and the recipient receives nothing but a WINMAIL.DAT file that they cannot open. The most commonly preached resolution was simply to tell the sender to stop using the Rich Text Format (RTF) when sending…

Adobe Flash 0-Day listed in the Angler and Magnitude Exploit Kits

It’s no surprise that another vulnerability was found in Adobe Flash. The latest flaw has been branded CVE-2015-3113 and has been added to the ever growing list of vulnerabilities listed in the Angler and Magnitude exploit kits (both of which are readily available). While Adobe released an update for this exploit last week, that update is dependent on users actually…

Are you a lazy WordPress administrator? Get with the program or stick to Facebook…

The Federal Bureau of Investigation released alert number I-040715a-PSA today, regarding the continuous defacement and exploitation of WordPress sites perpetrated by individuals sympathetic to the Islamic State (ISIL/ISIS). The defacements have affected website operations and communication platforms across the country, as well as internationally. The WordPress CMS (Content Management System) and lazy/uninformed WordPress administrators are the target of choice, as self-hosted…

Windows 10 coming to the Raspberry Pi 2

Kevin Dallas, General Manager of the Windows IoT Group just released information regarding Windows 10 compatibility with the just released Raspberry Pi 2. The Raspberry Pi 2 is the latest evolution of the Raspberry Pi device, which was released for retail purchase today. Microsoft will be working closely with the Raspberry Pi community via the Windows Developer for IoT program.…

USAA to FAA: Our Insurance Adjusters Want Drones

USAA To FAA: Our Insurance Adjusters Want Drones One of America’s biggest insurance companies thinks unmanned aircraft could change the way it processes disaster claims. – Article by Neal Ungerleider One of America’s largest insurance companies has an unorthodox proposal: using unmanned aircraft to speed up insurance claim processing. USAA, which serves millions of U.S. military personnel and their families…

Microsoft Security Advisory 3010060 – Not expecting that attachment? Be careful…

Microsoft warned users today regarding malicious Microsoft Office files that can grant the sender the same level of access that the person opening the attachment has. The vulnerability affects all supported releases of Windows. While any Office file can be used to execute this attack, PowerPoint files appear to be the most commonly used right now. As always… if you’re…

Popular Single Sign-On provider OneLogin breached (again)...Would you like to know more?
+