The Latest in IT Security

Posts Tagged ‘root privileges’

Another system on the network could take root privileges on a vulnerable Samba client or server.

Read more ...

Three vulnerabilities have been fixed in the latest version of Ciscos Unified Communications Domain Manager (Unified CDM), one of them allowing a potential attacker to connect from a remote location with root privileges, without authentication.Assigned the CVE-2014-2198 identifier, the security glitch could be exploited because of a default private SSH key intended for the support […]

Read more ...

We have been seeing apps that exploit vulnerabilities in Android, with most of them attempting to gain higher privileges on user devices. In recent days, a stronger and a far more advanced Android malware named ANDROIDOS_OBAD has come into play. What seems to be a product from the same malware authors behind ANDROIDOS_JIFAKE, ANDROIDOS_OBAD is […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments