Monthly Archives: May 2014

Daily Vulnerability News

See on Scoop.itCyberCrime and CyberSecurity

[remote] – AoA DVD Creator 2.6.2 – ActiveX Exploit
http://www.exploit-db.com/exploits/33432/

[remote] – AoA Audio Extractor Basic 2.3.7 – ActiveX Exploit
http://www.exploit-db.com/exploits/33431/

[webapps] – SafeNet Sentinel Protection Server 7.0 – 7.4 and Sentinel Keys
Server 1.0.3 – 1.0.4 Directory Traversal
http://www.exploit-db.com/exploits/33428/

[local] – CyberLink Power2Go Essential 9.0.1002.0 – Registry SEH/Unicode
Buffer Overflow
http://www.exploit-db.com/exploits/33426/

[remote] – AoA MP4 Converter 4.1.2 – ActiveX Exploit
http://www.exploit-db.com/exploits/33433

[webapps] – HP Release Control Authenticated XXE
http://www.exploit-db.com/exploits/33434/

See on sto-strategy.com

Daily Cyber News

See on Scoop.itCyberCrime and CyberSecurity

China has denounced US charges against five of its army officers accused of
economic cyber-espionage.

Beijing says the US is also guilty of spying on other countries, including
China, and accuses the US of hypocrisy and “double standards”.

China has summoned the US ambassador in Beijing over the incident. It says
relations will be damaged.

US prosecutors say the officers stole trade secrets and internal documents
from five companies and a labour union.

The BBC’s John Sudworth in Shanghai says it is extremely unlikely that any
of the accused will ever be handed over to the US.

See on sto-strategy.com

Jobs [Nu|lCon]

See on Scoop.itSTO_STRATEGY

Application / Senior Application Developer 

at CipherCloud India Pvt Ltd in Hyderabad (Published at 19-05-2014)

Job Responsibilities:
Review and analyze business requirements
Estimate and plan implementation effort for key product features
Write design diagrams, technical specifications and documentation
Write high-quality code with emphasis on security, performance, and
scalability
Participate actively and contribute to design and development discussions
Perform technical analysis to present pros and cons of various solutions to
management
Work closely with off-shore development and other team members to resolve
technical issues and coordinate builds/releases
Mentor junior team members as and when necessary .

See on sto-strategy.com

IM Data Leakage – Part I

See on Scoop.itSTO_STRATEGY

Latest news on data leakage claims that every second mobile application
does not comply with internationally accepted privacy principles. Recently,
Whatsapp was noticed about weak backup encryption that gives a cause for a 
special tool development and two years ago about weak data-motion
protection exposing usernames, telephone numbers and messages. What else IM
messenger could reveal. 

Let’s examine Whatsapp & Viber data-in-rest leakage.

See on sto-strategy.com

How to hack PayPal Manager and manage your Payflow account

Mark Litchfield, security expert atSecuratary has published an interesting
post on PayPal Manager Admin Account Hijack, let’s remember that PayPal
Manager is used to manage user’s Payflow account. The attack method against
Paypal manage described by Litchfield is articulated in a series of steps
during which it is necessary to overcome various obstacles to hijack the
Admins merchant account and their password.

from [STO STRATEGY] http://ift.tt/1iPqLgu
via IFTTT

EMM as a Security Approach – Part II. Popular misconceptions of MDM and Mobile Security

Participating at different conferences and events, it was noticed lots of
misconceptions about different security frameworks. It happened when
someone applies and uses solutions in wrong way or present disadvantages of
these solutions are. Let me share a set of most popular fails on MDM and
Mobile Security that usually might be get by specialist as like about ” We
gonna present our thoughts about , because we’ve just read
the screaming headlines 5 minutes ago …. “:

from [STO STRATEGY] http://ift.tt/1nOlJJ6
via IFTTT

EMM as a Security Approach – Part II. Popular misconceptions of MDM and Mobile Security

See on Scoop.itSTO_STRATEGY

Participating at different conferences and events, it was noticed lots of
misconceptions about different security frameworks. It happened when
someone applies and uses solutions in wrong way or present disadvantages of
these solutions are. Let me share a set of most popular fails on MDM and
Mobile Security that usually might be get by specialist as like about ” We
gonna present our thoughts about , because we’ve just read
the screaming headlines 5 minutes ago …. “:

 

See on sto-strategy.com