Hackers Can Hijack Phones via Replacement Screens
Touchscreens and other components that are often replaced in smartphones and tablets can hide malicious chips capable of giving attackers complete control over the device, warned researchers at the Ben-Gurion…
Read MoreTTCSIRT-035.081817: TT-CSIRT Advisory – Drupal Security Updates
Drupal has released an advisory to address several vulnerabilities in Drupal 8.x: a) CVE-2017-6924 – REST API can bypass comment approval – when using the REST API, users without the…
Read MoreTTCSIRT-034.081817: TT-CSIRT Advisory – CISCO Security Updates
Cisco has released updates to address vulnerabilities affecting multiple products: a) Cisco Application Policy Infrastructure Controller Vulnerability – could allow an authenticated remote attacker to gain higher privileges than the…
Read MoreHow To Recover A Hacked LinkedIn Account
If someone has hacked into your linkedin account, that means they have your password. Immediately change this so you can regain control. For further information on what to do if…
Read MoreProtect Your Privacy On Social Media
Let’s be honest, there are many reasons for being on social media: To see what your friends are doing, keeping up with news and sharing our opinions, getting fashion ideas…
Read MoreTTCSIRT-033.081417: TT-CSIRT Advisory – Symantec Security Updates
Symantec has released a security update to address the following security vulnerabilities in Symantec Messaging Gateway: a) Remote Code Execution – an individual may obtain the ability to execute commands…
Read More