install

now browsing by tag

 
 

Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks

Source: National Cyber Security – Produced By Gregory Evans

chrome browser software update

Google yesterday released a new critical software update for its Chrome web browser for desktops that will be rolled out to Windows, Mac, and Linux users over the next few days.

The latest Chrome 80.0.3987.122 includes security fixes for three new vulnerabilities, all of which have been marked ‘HIGH’ in severity, including one that (CVE-2020-6418) has been reportedly exploited in the wild.

The brief description of the Chrome bugs, which impose a significant risk to your systems if left unpatched, are as follows:

  • Integer overflow in ICU — Reported by André Bargull on 2020-01-22
  • Out of bounds memory access in streams (CVE-2020-6407) — Reported by Sergei Glazunov of Google Project Zero on 2020-01-27
  • Type confusion in V8 (CVE-2020-6418) — Reported by Clement Lecigne of Google’s Threat Analysis Group on 2020-02-18

The Integer Overflow vulnerability was disclosed by André Bargull privately to Google last month, earning him $5,000 in rewards, while the other two vulnerabilities — CVE-2020-6407 and CVE-2020-6418 — were identified by experts from the Google security team.

Google has said CVE-2020-6418, which stems from a type confusion error in its V8 JavaScript rendering engine, is being actively exploited, although technical information about the vulnerability is restricted at this time.

The search giant has not disclosed further details of the vulnerabilities so that it gives affected users enough time to install the Chrome update and prevent hackers from exploiting them.

A successful exploitation of the integer overflow or out-of-bounds write flaws could allow a remote attacker to compromise a vulnerable system by tricking the user into visiting a specially crafted web page that takes advantage of the exploit to execute arbitrary code on the target system.

It’s recommended that Windows, Linux, and macOS users download and install the latest version of Chrome by heading to Help > “About Chrome” from the settings menu.

The Original Source Of This Story: Source link

The post Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks appeared first on National Cyber Security.

View full post on National Cyber Security

iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps

Source: National Cyber Security – Produced By Gregory Evans

iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps

The cyber security community is still reeling after the revelation of the KRACK security vulnerability that breaks down Wi-Fi encryption. Now it seems another Wi-Fi-based bug has also been discovered.

Presented at the global Pwn2Own hacking contest in Tokyo, a team of researchers demonstrated how a separate Wi-Fi bug could be exploited to gain entry to iPhones and install malicious apps on them without the owners knowledge.

The details of the threat haven’t been made public yet as Apple hasn’t had time to patch the flaw. It’s discovery was enough to net the Tencent Keen Security Lab the top prize of $110,000.

The hacking contest is set up and run by the Zero Day Initiative, which seeks to find vulnerabilities in popular products and services and alert the manufacturers in time.

According to the official event page , the Tencent Keen Security Lab team used “code exectution through a WiFi bug” to escalate “privileges to persist through a reboot.” Effectively breaking through an iPhone’s lock screen through a Wi-Fi network.

The flaw will be relayed to Apple which could offer a software patch to close the gap.

“Once we verify the research presented is a true 0-day exploit, we immediately disclose the vulnerability to the vendor, who then has 90 days to release a fix,” explains the Zero Day Institute.

“Representatives from Apple, Google, and Huawei are all here and able to ask questions of the researchers if needed.

“At the end of the disclosure deadline, if a vendor is unresponsive or unable to provide a reasonable statement as to why the vulnerability is not fixed, the ZDI will publish a limited advisory including mitigation in an effort to enable the defensive community to protect users.”

As ever, from a security standpoint it is always advisable to make sure your phone is running the latest OS version and you closely vet the permissions you give to certain apps.

The post iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Windows users urged to install latest updates following NSA hacking leak

Source: National Cyber Security – Produced By Gregory Evans Windows users have been urged to make sure their operating systems are kept up to date after hackers released details of exploits which cyber criminals could use to hack Microsoft’s operating system. Details of the exploits were released by the … The post Windows users urged […]

The post Windows users urged to install latest updates following NSA hacking leak appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles

Source: National Cyber Security – Produced By Gregory Evans

Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles

While Delhi Police have launched a slew of mobile apps for reporting crime, its South district branch has set up a new app to track stolen vehicles parked on streets. A special camera is installed at PCR vans which will register the number plates of vehicles parked on the streets. The camera is equipped with special software which will further match the data captured with the data of stolen vehicles. Though the project is launched on trial basis, soon the entire unit of Delhi Police will start using the app. According to South district police officials, this technology will improve the cops’ efficiency to trace stolen vehicles. Prem Nath, Deputy Commissioner of Police, South District, told Mail Today that ‘Vehiscan’ is on trial run and things will be finalised after some time. “We have used this technology in various areas of Saket and Mehrauli where it performed effectively. Currently we are using it for stolen vehicles but soon it will be used to trace vehicles involved in other crimes as well,” he added. “Recently, we have started using this technology and successfully found five expensive cars stolen from various parts of Delhi,” a senior police official said. Explaining the technology, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles appeared first on National Cyber Security.

View full post on National Cyber Security

Lafayette looking to install crime cameras at 52 locations

Source: National Cyber Security – Produced By Gregory Evans

The Lafayette Police Department soon will be keeping a watchful electronic eye on some city neighborhoods. The installation of crime cameras could begin this year at 52 locations, mainly areas in north Lafayette selected through a combination of input from the City-Parish Council and a review of crime statistics to pinpoint high-risk neighborhoods, said Police Chief Jim Craft. “What area has the most need? That’s what we want to look at,” Craft told a council committee Monday in an update of the crime camera program. The council last year approved the department’s request for $700,000 to buy the cameras and related equipment.There is an additional recurring expense of about $100,000 a year to keep the system running and for the Internet connections needed to link the cameras to the Police Department. Other communities have had a mixed experience with crime cameras, some touting them as effective crime-fighting tools and others questioning their value, but Craft said he believes the money will be a wise investment in a tool to extend the reach of the city’s officers. “We see them as force multiplier,” the chief said. Councilman Jay Castille agreed. “We don’t have enough patrol officers out there, and it’s going […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Lafayette looking to install crime cameras at 52 locations appeared first on National Cyber Security.

View full post on National Cyber Security

Apple Mavericks install proceeds while encrypting – Missing Computer AlertMissing Computer Alert

missingcomputeralert.com – When upgrading a FileVault 2-encrypted Mac to Mavericks, you may see the following behavior if the disk being upgraded is in the process of encrypting or dec…

View full post on Hi-Tech Crime Solutions Weekly

Gregory Evans Explains Why You Should Install Spyware On Your Childs Computer

Computer Security Expert and Ex-Hacker Gregory Evans explains to parents why you should install spyware on your childs computer and cell phone. View full post on Cyber Security News From The Real Experts Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

How To Install Mac OS X Yosemite On A Partition – Missing Computer AlertMissing Computer Alert

missingcomputeralert.com – How To Install Mac OS X Yosemite On A Partition Beta Program: https://appleseed.apple.com/sp/betaprogram. Should you backup Maverics even though your hardrive is partitioned ? How do I revert back…

View full post on Hi-Tech Crime Solutions Weekly

Hackers broke into poker pro’s hotel room to install ‘sharking’ malware

  This September, on the Barcelona leg of the European Poker Tour, Jens Kyllönen had a strange run-in with the the criminal underworld. He had busted out of that day’s tournament early, but when he returned to his hotel room, his laptop was missing. He went downstairs to find his roommate, but when they came […] View full post on Gregory d. evans