Archive

Posts Tagged ‘Cybersecurity’

Nothing but the truth: the legacy of George Orwell’s Nineteen Eighty-Four

Every generation turns to it in times of political turmoil, and this extract from a new book about the novel examines its relevance in the age of fake news and Trump

Read other extracts from the book:
• David Bowie’s Orwell: how Nineteen Eighty-Four shaped Diamond Dogs
• ‘He typed in bed in his dressing gown’: how Orwell wrote Nineteen Eighty-Four

December 1948. A man sits at a typewriter, in bed, on a remote island, fighting to complete the book that means more to him than any other. He is terribly ill. The book will be finished and, a year or so later, so will the man.

January 2017. Another man stands before a crowd, which is not as large as he would like, in Washington DC, taking the oath of office as the 45th president of the United States of America. His press secretary says that it was the “largest audience to ever witness an inauguration – period – both in person and around the globe”. Asked to justify such a preposterous lie, the president’s adviser describes the statement as “alternative facts”. Over the next four days, US sales of the dead man’s book will rocket by almost 10,000%, making it a No 1 bestseller.

Continue reading…

from Data and computer security | The Guardian http://bit.ly/2WanK9Y
via IFTTT

May I have a word about… Pegasus spyware | Jonathan Bouquet

Is the powerful virus that infected WhatsApp a flying horse or a Trojan horse? Don’t ask the woman who developed it

The unsavoury revelations about the hacking of WhatsApp by software developed by Israeli company, NSO Group, raised some interesting imagery. NSO has developed a powerful smartphone virus called Pegasus, described by NSO co-founder Shalev Hulio as the company’s Trojan horse that could be sent “flying through the air” to infiltrate devices.

Right, let’s get this straight. Pegasus was the son of mortal Medusa and Poseidon, god of the sea. Pegasus and his brother Chrysaor were born from the blood of their beheaded mother, who was tricked and killed by Perseus. Pegasus was represented as a kind-hearted, gentle creature, somewhat naive but always eager to help.

Continue reading…

from Data and computer security | The Guardian http://bit.ly/2Yyt7gw
via IFTTT

[webapps] Interspire Email Marketer 6.20 – ‘surveys_submit.php’ Remote Code Execution

Interspire Email Marketer 6.20 – ‘surveys_submit.php’ Remote Code Execution

from Exploit-DB.com RSS Feed http://bit.ly/2YGV5Hd
via IFTTT

[local] Iperius Backup 6.1.0 – Privilege Escalation

Iperius Backup 6.1.0 – Privilege Escalation

from Exploit-DB.com RSS Feed http://bit.ly/2HnUYdz
via IFTTT

[dos] CEWE Photo Importer 6.4.3 – ‘.jpg’ Denial of Service (PoC)

CEWE Photo Importer 6.4.3 – ‘.jpg’ Denial of Service (PoC)

from Exploit-DB.com RSS Feed http://bit.ly/2YA4vnw
via IFTTT

[dos] CEWE Photoshow 6.4.3 – ‘Password’ Denial of Service (PoC)

CEWE Photoshow 6.4.3 – ‘Password’ Denial of Service (PoC)

from Exploit-DB.com RSS Feed http://bit.ly/2HnFfeG
via IFTTT

[dos] Sandboxie 5.30 – ‘Programs Alerts’ Denial of Service (PoC)

Sandboxie 5.30 – ‘Programs Alerts’ Denial of Service (PoC)

from Exploit-DB.com RSS Feed http://bit.ly/2YwCzkD
via IFTTT