Linux Worm Attacks ‘Things’

Linux.Darlloz, in addition to being able to attack Linux computers, has the ability to target small devices attached to the internet. Vulnerabilities in chips used in home routers, security cameras, set-top boxes like Apple TV, Roku, cable boxes and etc. and even industrial controllers are susceptible to this worm. The devices above utilize Linux services to…

Cisco Updates ASA Software

Cisco advisory cisco-sa-20131009-asa originally released on October 9, 2013 was updated today. According to Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities: IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability SQL*Net Inspection Engine Denial of Service Vulnerability Digital Certificate Authentication Bypass Vulnerability Remote Access VPN Authentication Bypass Vulnerability Digital Certificate…

Use Firewalls

Do not operate computers without using firewalls. A firewall protects a computer, or network, through a series of access control policies separating that computer, or network, from other computers, or networks. There are two types of firewalls: Software firewall – software running on an individual computer Hardware firewall – a dedicated device designed to protect…