Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘Toshiba’
Most Recent
 
Read More
December 9, 2015

Vulnerabilities: Holes Discovered in Support Software from Toshiba, Dell, and Lenovo

Toshiba Service Station, Dell System Detect, and Lenovo Solution Center all have security vulnerabilities, according to new research by an anonymous hacker group. Lenovo’s Windows platform seems to be specifically affected. One of its vulnerabilities actually allows malicious code to be executed via the web, through an internal browser.

The group goes by “Ring of Lightning” and made no bones about publishing the exploit kits on their website. The most heinous of the exploits was apparently Lenovo, which allows for remote execution if the software is running on the host computer at the time of the attempt.

Also read: Lenovo Caught [...]

7215
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University