Norton provided a write-up explaining on the Linux and Mac OS X vulnerability known as 'Shellshock' or the 'Bash Bug' works in an infographic and video, both are embedded below. The vulnerability is more formally known as CVE-2014-6271: GNU Bash Remote Code Execution Vulnerability. Windows computers are unaffected by the vulnerability but Linux and Mac OS X computers, as well … [Read more...]
Sprint hijacking NXDomain errors to search-error.com
I created a new subdomain recently and wanted to test it out before advertising on it since the DNS change could take a while to propogate. I waited a couple of hours and it worked on my home computer. To get a second opinion, I took my Android phone off of wireless and tried to browse to the subdomain on the cell network using Chrome for Android. Instead of reaching the page I … [Read more...]
Internet Explorer will block out-of-date Java and other ActiveX controls
With an update today, Internet Explorer will block out-of-date ActiveX controls in 30 days. Old versions of Java will be the first control that will be blocked with others joining in the future. As a result, Internet Explorer 8-11 on Windows 7 SP1 and Internet Explorer (Desktop version) on Windows 8.X, as well as Windows Server versions, will now show a message when you try to … [Read more...]
Symantec report analyzes personal fitness trackers and security concerns
Symantec Security Response prepared a report on wearable fitness devices and found vulnerabilities with the devices and the model of data custodianship. It wasn't that long ago that your best way of tracking your activity might be an old-fashioned pedometer that mechanically incremented with each step. The next step was heart rate monitors, GPS watches, and smartphones that … [Read more...]
Symantec Endpoint Protection giving Trojan.Webkit!html false positive
Symantec Endpoint Protection is flagging files called sh165.htm from people's Temporary Internet Files as a Trojan.Webkit!html. My Symantec Endpoint Protection Manager is currently reporting hundreds of the detections around the organization. The file is found at the multiple paths depending on the browser used. The file detected as a Trojan webkit might also be named … [Read more...]