What happened to JP Morgan hack of 76 mil accounts?

Wall street Journal has the story behind their paywall. In mid-June hackers attacked and gained access to servers and data. 2 months go by and JPMorgan defense does not know anything,  the hackers steal 76 million accounts and use JP Morgan servers. In mid August is when the cybersecurity teams actually find the problems and … Read more

ComputerCop is insecure and can give info to hackers

There is a program that some law enforcement agencies  have given to families across the country It is called ComputerCOP.  The EFF (Electronic Frontier Foundation) has reviewed and analyzed the program, and unfortunately it consists of a keylogger and transmits data unencrypted across the Internet. if someone enters a credit card or password username combinations, then … Read more

Perl Scripting vulnerability – Data Dumper

Perl discussion at lsexperts.de  has a data Dumper vulnerability – review your Perl scripts to : Applications written in Perl should ensure that a sanity check on data serialized by Data::Dumper is performed.   WordPress vulnerabilities page which was recently set up. Andreas Kurtz found malicious iOS apps  after iOS 8 was released. The issue … Read more

Bash shellcode reality

What started as an environment of function and usability on Unix systems has devolved in another security exploit mess. US -CERT has the report for both potential exploits now (one was patched)   all tools are there for hackers to exploit specific websites running Linux or Unix. That means  that there are many websites that … Read more

Bash Shellcode truth

There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169   Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env x='() { :;}; echo vulnerable’ bash -c “echo this is a test” RedHat Blog also discusses it and has set up a FAQ Updating Bash on … Read more