Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 101 Next »

16%
macOS Under Attack
15.02.2017
Home »  News  » 
 
is. However, because the code is based on EmPyre, researchers believed that it could be the second-stage component of EmPyre, which is a persistent agent that allows a remote attacker continued access
16%
Serious Flaw in Microsoft Word is Being Used to Install Malware
11.04.2017
Home »  News  » 
 
to a targeted user with an embedded OLE2link object. When the user opens the document, winword.exe issues a HTTP request to a remote server to retrieve a malicious .hta file, which appears as a fake RTF file
16%
Microsoft Brings Azure App Service to Linux
11.09.2017
Home »  News  » 
 
or automatically. If developers want more control over the application, they can SSH into the application and get complete remote access. In addition to Web Apps for Linux, developers can use the service to deploy
16%
AI Bluetooth Attack
21.11.2017
Home »  News  » 
 
. Amazon Echo is affected by two vulnerabilities: remote code execution vulnerability in the Linux Kernel (CVE-2017-1000251) and information leak vulnerability in the SDP Server (CVE-2017-1000250). Google
16%
Apple’s High Sierra Bitten by Root Bug
05.12.2017
Home »  News  » 
 
, install packages, and steal critical data. You don’t even need physical access to the device. If the system is using screen sharing, any remote user can log in to the system as root. It works from both
16%
Zero Day Mac OS Kernel Flaw
02.01.2018
Home »  News  » 
 
their cause. I would've submitted it to Apple if their bug bounty included Mac OS, or if the vuln was remotely exploitable. Since neither of those is the case, I figured I'd just end 2017 with a bang because
16%
Arduino Adds Rasp Pi and Beaglebone to the Arduino Create Platform
14.03.2018
Home »  News  » 
 
and communicate with each other, leveraging the capabilities provided by the new Arduino Connector. Moreover, IoT devices can be managed and updated remotely, independently from where they are located. Source
16%
Orangeworm, a New Hacking Group Targeting Healthcare Industry
24.04.2018
Home »  News  » 
 
procedures. Trojan.Kwampirs creates backdoor remote access to the compromised system and starts collecting information about the computer. Symantec believes that Orangeworm probably uses this information
16%
Flaws in the LTE Mobile Communication Standard
02.07.2018
Home »  News  » 
 
Forget about that suspicious attachment in your mail or some shady website installing malware on your system, now a flaw in LTE mobile communication protocol used with 4G networks enables remote
16%
Multiple Vulnerabilities Found in FreeRTOS
22.10.2018
Home »  News  » 
 
. Karliner said that these vulnerabilities allow an attacker to crash the device, leak information from the device’s memory, and remotely execute code on it. FreeRTOS is a popular option for IoT and embedded

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice