Posted On

О том, какие требования новый федеральный закон предъявляет к защите конфиденциальности приватных сведений, расскажет эта статья. В конце июля Президент РФ В.В. Путин подписал закон «О персональных данных». В результате с февраля 2007 года торговля приватными базами данных становится преступлением, все виды организаций обязаны обеспечить безопасность личной информации своих сотрудников и клиентов, а за утечку…

Posted On

A debate is raging over who has the right to repair electronic equipment without voiding manufacturers’ warranties. On one side, companies such as Apple, Lexmark and Verizon are seeking to quash “right-to-repair” legislation; on the other, supporters of right of repair initiatives are accusing the tech industry of scare tactics. At issue is whether right-to-repair…

Posted On

Anyone who is on the internet is vulnerable to cyber attacks. Today, we depend on the internet for all kinds of things, including shopping, financial services and transactions, communication, entertainment etc. At work also, the internet plays a key role. Hence, it’s important that we stay secure, whenever we are on the internet. Here’s a…

Posted On

Обвинения США в том, что РФ причастна к хакерской атаке на федеральные ведомства страны, бездоказательны. Об этом в четверг, 24 декабря, заявила официальный представитель российского МИДа Мария Захарова. Она пояснила, что Вашингтон не приводит никаких конкретных сведений или цифр. Как добавила представитель министерства, подобные обвинения могут являться попыткой помешать наладить отношения между новым правительством Штатов…

Posted On

Автор: Mohamed Shahat Код эксплоита находится здесь . Суть уязвимости Код, показанный ниже, находится здесь . NTSTATUS TriggerStackOverflow(IN PVOID UserBuffer, IN SIZE_T Size) { NTSTATUS Status = STATUS_SUCCESS; ULONG KernelBuffer[BUFFER_SIZE] = {0}; PAGED_CODE(); __try { // Verify if the buffer resides in user mode ProbeForRead(UserBuffer, sizeof(KernelBuffer), (ULONG)__alignof(KernelBuffer)); DbgPrint(“[+] UserBuffer: 0x%p “, UserBuffer); DbgPrint(“[+] UserBuffer Size:…

Posted On

Just a few weeks after Facebook and Google faced controversial embarrassment when it comes to their security, seems like it is Apple’s turn for their own version of a security fiasco. Apple has officially apologized for the hacked Apple’s ID, as some of their customers in mainland China were targeted by spear phishing. The world’s…

Posted On

This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Over the past five years, Slack and HackerOne have established a partnership and commitment to ensure Slack’s platform is secure for its over 12 million daily active users . To build on this momentum and engage top researchers from the HackerOne community,…

Posted On

Cybersecurity researchers on Wednesday disclosed 14 vulnerabilities affecting a commonly-used TCP/IP stack used in millions of Operational Technology (OT) devices manufactured by no fewer than 200 vendors and deployed in manufacturing plants, power generation, water treatment, and critical infrastructure sectors. The shortcomings, collectively dubbed “INFRA:HALT,” target NicheStack, potentially enabling an attacker to achieve remote code…

Posted On

If you’re a crypto enthusiast and adventurer with no plans for April 2019, perhaps you can merge your two passions and attend the first Blockchain and Cryptocurrency Conference to be held in North Korea. In a press release published on the official website of the country, the Korean friendship association announced that preparations are underway…