Jump to content
Killersites Community

Search the Community

Showing results for tags 'vulnerability'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Entrepreneurship, Business and Marketing
    • Course: Business Battle Plan
    • Social Media Marketing & Web Marketing
    • Entrepreneurship
  • Community Lounge and FAQ
    • Open Forum
    • New Members Forum - Start Here!
    • Forum Rules and Etiquette
    • Killersites Announcements
  • Web Design
    • Beginners Web Design
    • HTML/XHTML
    • CSS
    • Advanced Web Design
    • Business of Web Design
    • Web Design News
  • Software
    • StudioWeb
    • Dreamweaver
    • Photoshop
    • Miscellaneous Software
  • Programming
    • Python
    • Javascript
    • PHP
    • General Programming
    • Beginners Ruby
  • Miscellaneous
    • Cybersecurity
    • Blogs and CMS
    • Web Accessibility
    • Peer-to-Peer Reviews
    • Website Templates
    • Web Design Jobs
  • Archives
    • Beginners Web Design
    • Web Accessibility
    • CSS
    • Flash
    • ASP
    • Expression Web
    • Killersites University
    • Actionscript

Calendars

  • Community Calendar

Categories

  • Web Templates
  • PHP Script Bank
  • Javascript Script Bank
  • Web Design Documents and Contracts

Found 4 results

  1. For those of you using DirtectTV, there is a risk that could allow attackers access to your system and network. Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices https://thehackernews.com/2017/12/directv-wvb-hack.html I have not discussed this issue yet as it can be a tad complicated for those who have never dealt with your routers yourselves. It may be a good idea to talk to someone in "The Know" or discuss it with your ISP support team. The real issue here is IoT (Internet of Things), all the gadgets that are being developed to use the internet. The folks who create your OS generally think about security. The folks who develop your router think about security. But does the developer of all this IoT crap think about security? Did the software developer for you internet connected coffee machine, pace maker, iBarbecue thing think about security? Likely not... so time and time again researchers and bad actors have found ways to bypass the best security people thought they had by hacking a unprotected IoT device. This is another example how hackers can get into your network through your Smart TV. For those of you who like a challenge, find a way to limit your IoT things contact to your network. It needs access to the Internet, but no other devices, it needs no access to your computers or tablets and phones. This way if compromised, the attacker can't do much of anything. Another way is to replace your Router's firmware with an opensource software with something like DD-WRT. Routers can do much more for security if you understand them, but their firmware is "Simplistic" for the average user. By getting more control with other software you can create two networks, your main network and a locked down network for just IoT devices with no contact to your personal devices.
  2. Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability https://thehackernews.com/2017/12/windows-update-malware-protection.html
  3. If anyone at Killersites builds Android mobile apps or knows someone who does, take note of vulnerabilities is the development tools. https://thehackernews.com/2017/12/android-development-tools.html
  4. I think this is important enough to warrant it's own thread. A vulnerability has been found in the WPA2 standards for wifi security. This is the standard security you all should be using on your access points/routers. This is also a vulnerability in the standards, not in a proiduct, so it effects everyone using WPA2 regardless of what systems you are using. I should also add that this is a proof of concept. That means researchers have found this flaw and already announced it to manufacterers so they can work on patches before it goes public as not only do we now know it exists, but so do our adversaries so they can now use it to attack targets. Most importantly with this is that it effects more the clients, so laptops, tables, phones and towers etc. you should keep an eye open for patches as of right now from your OS developer as well as your router/hardware developer and apply it as soon as possible. New WPA2 Attack (KRaCKs) - How To Prevent It https://www.stationx.net/new-wpa2-attack-kracks-prevent/ KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol https://thehackernews.com/2017/10/wpa2-krack-wifi-hacking.html Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ WPA2 security flaw puts almost every Wi-Fi device at risk of hijack, eavesdropping http://www.zdnet.com/article/wpa2-security-flaw-lets-hackers-attack-almost-any-wifi-device/ Wi-fi security flaw 'puts devices at risk of hacks' http://www.bbc.com/news/technology-41635516
×