Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Millions of machines affected by command execution flaw in Exim mail server

    The flaw, which dates back to version 4.87 released in April 2016, is trivially exploitable by local users with a low-privileged account on a vulnerable system running with default settings. All that's required is for the person to send an email to "${run{...}}@localhost," where "localhost" is an existing local domain on a vulnerable Exim installation. With that, attackers can execute commands of their choice that run with root privileges.

  • Fortune 500 firm Tech Data leaks 264Gb of data online

    Security researchers from virtual private network firm vpnMentor have found an unsecured server belonging to American multinational tech vendor Data Tech online, containing 264GB of data about its client servers, invoices, SAP integrations and plaintext passwords.

  • Android malware once found a way onto phones before they even shipped

    Today, Google posted what amounts to a case study of some very persistent and clever hackers who kept trying to get malware on Android phones. It’s about the “Triada family” of apps designed to put spam and ads on a device. After a brief history of how it started in 2016 and an overview of how early versions worked, Google got to the surprising turn in the story: Triada devised a method to get malware on Android phones virtually at the factory, before customers had even opened the box or even installed a single app.

  • Google details Triada malware – three years after it was reported!

    Three years after it was first reported by Russian security firm Kaspersky ((formerly Kaspersky Lab), Google has suddenly decided to confirm a report that the firmware updates of some Android devices were compromised through their supply chain so that they could be infected with malware.

More in Tux Machines