Cis co has released security to address Multiple Vulnerabilities in Cisco WebEx Recording Format and Advanced Recording Format Players. If left unpatched, attackers could exploit them and gain complete control of the system. BtCIRT encourages users and administrators to review the Cisco Security Advisory for more details on affected products and required actions. Patch and be protected.
Apple has released Security update to address the administrative bypass bug in Mac OS High Sierra 10.13.1. If left unpatched, attackers could gain admin control of your system. BtCIRT encourages users and administrators to review the Security Update 2017-001 for more details and required actions. For detailed information on the vulnerability please visit www.kb.cert.org Patch and be protected.
BtCIRT has known from different sources that the latest version of MacOS High Sierra 10.13.1 has a major security bug that allows full admin access using root user without password. While apple might fix the issue, in the mean time BtCIRT recommends all users and administrators to take following measure to ensure you are not victimized. Open Terminal and run the following command to change password for root user. $ passwd root Old Password: [hit enter to assuming it to be blank] New Password: [Give a strong password] Retype New Password: [reinter your new password] By doing the above you […]
Intel has identified security vulnerabilities in some of its products that could potentially place impacted platforms at risk. If left unpatched, attackers could exploit them and gain complete control of the system. BtCIRT encourages users and administrators to review the Intel Security Advisory for more details on affected products and required actions. Patch and be protected.
Introduction: Mining for cryptocurrencies is an ever more complex task that consumes more and more energy resources and computing power. Cryptocurrency mining, or cryptomining, is simply the way in which cryptocurrency is earned. Individuals mine cryptocurrency by using cryptomining software to solve complex mathematical problems involved in validating transactions. Each solved equation verifies a transaction and earns a reward paid out in the cryptocurrency. Solving cryptographic calculations to mine cryptocurrency requires a massive amount of processing power.This is exactly why hackers have found a way to make it easier: they get onto other people’s computers and put them to work […]