Most devices like printers, scanners, and VoIP systems nowadays have embedded Web servers for easy administration. Unfortunately, many of these devices are mostly unprotected due to lapses in configuration. Some servers are not properly configured and can be accessed using the default user name and password or are left with no means of protection. What’s…
Read MoreJhoevine Capicio
Threats Analyst
C2C Anyone? For chatters who frequent Yahoo! Chat rooms, this is a common thing to say… C2C (Cam to Cam) Chat has been very popular nowadays, from chatters who just want to view their chat mates to webcam shows to far away loved ones…most of the time a webcam is used while chatting on Yahoo!…
Read MoreIt seems Italy is fast becoming the hub of malware authors. I still remember the nasty days when the Linkoptim also known as Gromozon malware was spreading like wildfire throughout the net. And now typo-squatters have followed the lead of LinkOptim to again plague the Italian surfers. For those unfamiliar with typo-squatting, you can read…
Read MoreFYI for music lovers… A new zero day has vulnerability in Winamp which can cause arbitrary code execution been reported. The vulnerability occurs in Winamp due to the way that it handles .MP4 files. This can be exploited by would be attackers by creating a specially crafted MP4 file and posting it to websites or…
Read MoreIf you’re updated with the news in the security industry, then you know that there have been a lot of vulnerabilities in MS Office Applications that are being exploited. Because of this, it has been a common advice to use safer document formats like RTF. What didn’t cross my mind is that RTF files can…
Read More