Quantcast
Channel: PC World - Rapid7 RSS feed
Browsing all 38 articles
Browse latest View live

Metasploit 4.0 sets the stage for mass penetration testing

Security product provider Rapid7 has updated its widely used open-source Metasploit exploitation framework, expanding the software so it supports enterprise IT security staff as well as its core...

View Article



Tor network used to command Skynet botnet

Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from...

View Article

UPnP flaws expose tens of millions of networked devices to remote attacks,...

Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their...

View Article

Broadcom UPnP implementation also contains critical vulnerability,...

Security researchers from Croatia-based security firm DefenseCode claim to have found a critical remote code execution vulnerability in the UPnP (Universal Plug and Play) implementation developed by...

View Article

Researcher hijacks insecure embedded devices en masse for Internet scanning...

An anonymous researcher created a massive botnet by hijacking about 420,000 Internet-accessible embedded devices with default or no login passwords and used it to map the entire Internet.

View Article


New backdoor malware 'KeyBoy' used in targeted attacks in Asia, researchers say

Users from Vietnam, India, China, Taiwan and possibly other countries, were targeted as part of an attack campaign that uses Microsoft Word documents rigged with exploits in order to install a backdoor...

View Article

Android mega flaw fixed but phones remain vulnerable

Google quickly addressed a mega flaw in its Android mobile operating system after security researchers brought it to the company's attention earlier this month, but those fixes appear to be slow in...

View Article

Cybercriminals increasingly use the Tor network to control their botnets,...

Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control (C&C) servers, according to researchers from security...

View Article


Fingerprint sensor in iPhone 5S is no silver bullet, researchers say

The fingerprint sensor in Apple's new iPhone 5S has the potential to enhance the security of the device, but the devil will be in the details.

View Article


Public release of IE exploit could spark widespread attacks

An exploit for a vulnerability that affects all versions of Internet Explorer and has yet to be patched by Microsoft has been integrated into the open-source Metasploit penetration testing tool, a move...

View Article

Open-source software projects need to improve vulnerability handling...

Many open-source software developers need to improve the way in which they handle vulnerability reports, according to researchers from security firm Rapid7, who recently found and reported...

View Article

Spike in traffic with TCP source port zero has some researchers worried

A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more serious attacks, according to security researchers from...

View Article

Despite patches, Supermicro's IPMI firmware is far from secure, researchers say

The Intelligent Platform Management Interface (IPMI) implementation found in motherboards from server manufacturer Supermicro suffers from serious vulnerabilities that could allow attackers to remotely...

View Article


Proprietary firmware poses a security threat, Ubuntu founder says

Mark Shuttleworth, the founder of the popular Ubuntu Linux distribution, believes proprietary firmware and unverifiable firmware code poses a serious security threat to users and encourages hardware...

View Article

Many servers expose insecure out-of-band management interfaces to the Internet

Many servers expose insecure management interfaces to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration...

View Article


Hacker coalition sets out to improve critical device security, challenges car...

A collective of security researchers issued a letter Friday from the DefCon hacker conference in Las Vegas urging the automotive industry to adopt five principles for building safer computer systems in...

View Article

Vulnerabilities found in more command-line tools, wget and tnftp get patches

The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities.

View Article


OpenSSL patches eight new vulnerabilities

Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.

View Article

Thousands of U.S. gas stations exposed to Internet attacks

Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.

View Article

OpenSSL fixes serious denial-of-service bug, 11 other flaws

The mystery high-severity flaw that people were expected to be fixed in OpenSSL is no Heartbleed, but it is serious and users should update.

View Article
Browsing all 38 articles
Browse latest View live




Latest Images