How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Toshiba’
Most Recent
Read More
December 9, 2015

Vulnerabilities: Holes Discovered in Support Software from Toshiba, Dell, and Lenovo

Toshiba Service Station, Dell System Detect, and Lenovo Solution Center all have security vulnerabilities, according to new research by an anonymous hacker group. Lenovo’s Windows platform seems to be specifically affected. One of its vulnerabilities actually allows malicious code to be executed via the web, through an internal browser.

The group goes by “Ring of Lightning” and made no bones about publishing the exploit kits on their website. The most heinous of the exploits was apparently Lenovo, which allows for remote execution if the software is running on the host computer at the time of the attempt.

Also read: Lenovo Caught [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University