blog trackingRealtime Web Statistics Remote Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Remote’

Hackers find a way into your computer through remote access program

635840046081818710-HackersAP

Source: National Cyber Security – Produced By Gregory Evans

Hackers find a way into your computer through remote access program

What if having a password to log onto your computer couldn’t stop a hacker from getting in? What if the one thing you overlooked, is leaving the door to your personal or business files wide open? There’s a remote access program that’s allowing hackers right into computers because of a lack of password protection on the user’s end. Documents with industrial information, plans for power plants, even confidential patient data, are all screens the computer user thought were only visible to them. “This is me live on their system,” said WPTV Internet Security Expert Alan Crowetz, www.infostream.cc. “I had full access as if I was sitting in South Korea in front of that computer.” The program, VNC, is one that many businesses and computer users have. It allows tech support to gain access to their computers and troubleshoot technical problems. ‘What VNC is, is a remote control program designed to put you in front of the computer,” added Crowetz. It’s a free and useful program, problem is, users are not protecting their remote access with passwords. Crowetz showed us how easy it is to look at someone else’s screen remotely. He downloaded VNC viewer, typed in an IP address and […]

The post Hackers find a way into your computer through remote access program appeared first on National Cyber Security.

View full post on National Cyber Security

Flickr vulnerable to SQL Injection and Remote Code Execution Flaws

Source: National Cyber Security – Produced By Gregory Evans

Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by critical web application vulnerabilities, which left website’s database and server vulnerable hackers.Ibrahim Raafat, a security researcher from Egypt has found SQL injection vulnerabilities on Flickr Photo Books, new feature for printing custom photo books through Flickr that was launched 5 months ago.He claimed to have found two parameters (page_id , items) vulnerable to Blind SQL injection and one  (i.e. order_id) Direct SQL Injection that allowed him to query the Flickr database for its content by the injection of a SQL SELECT statements.A Successful SQL exploitation could allow an attacker to steal the Database and MYSQL administrator password. Furthermore, Flickr’s SQL injection flaws also facilitate the attacker to exploit remote code execution on the server and using load_file(“/etc/passwd“) function he was successfully managed to read the content from the sensitive files on the Flickr server In addition to this, Ibrahim was able to write new files on the server that let him upload a custom ‘code execution shell’.   Source: http://whogothack.blogspot.co.uk/2014/04/flickr-vulnerable-to-sql-injection-and.html#.VkJkXfmqqko The post Flickr vulnerable to SQL Injection and Remote Code Execution Flaws appeared first on Am I Hacker Proof. View full post on Am I Hacker […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Flickr vulnerable to SQL Injection and Remote Code Execution Flaws appeared first on National Cyber Security.

View full post on National Cyber Security

Microsoft launches beta of new Remote Desktop app for Mac

Microsoft has a public Remote Desktop app available on the Mac that can be downloaded from the App Store, and the Redmond giant is now rolling out a beta client with a new user interface. The beta app also boasts new feature additions, including improved user account management, and the ability to use native Mac commands such as Command-X,C,V to cut, copy and paste within a remote session.

The beta client of Remote Desktop retains features seen in the public release, such as seamless audio and video streaming, as well as connecting to local desktops with a single monitor. Microsoft mentions that it will continually add new features to the beta app, including support for multiple monitors, clipboard redirection, Remote Desktop gateway and remote resources (RemoteApp and desktop connections).

Got feedback? Make sure to let Microsoft know through the UserVoice portal. Once again, the new Remote Desktop app is in beta and should be treated as such. You may run into bugs, freezes or crashes when using the utility.

Beta test the new Remote Desktop app for Mac

Source: Microsoft

View full post on MobileNations

HCTVRemote: TV Remote Hidden Camera

HCTVRemote: TV Remote Hidden Camera

The HCTVRemote disguises a high quality DVR in a simple universal remote shell. A common household tool this “universal remote” is right at home in one of the most commonly used rooms in your house. Place it on top of an entertainment center and it blends right in with the 5 other remotes you surely have laying around but aren’t quite sure what they do.

Simple to operate. While the remote contains many button only one special button is used to operate the remote. Power and video are handled from one simple button reducing the chance of accidental discovery.

 

High resolution color video. It is hard to imagine that camera fits in this every day black remote that takes 1280 x 720 resolution video at 30 frames per second. The HC-TV Remote has of internal storage

 

Recording time. The TV Remote will record up to 1.5 Hours or HD video with the battery lasting up to 3 hours before it needs recharging.

 

 

Features

  • Built in Li-Ion battery
  • Time/Date stamp

 

Technical Specs

  • Video Resolution: 1280 x 720 @ 30fps
  • Storage: Internal 8GB
  • Storage Consumption: ~1GB consumed every 12 minutes
  • Recording Capacity: 1.5 hours
  • Battery Life: Up to 3 hours

 

Includes

  • 1 x TV Remote Hidden Camera
  • 1 x USB Cord
  • 1 x Instruction Booklet

 

Compatible With

  • Windows up to Win8
  • Mac

 

*Please note the following:

  • Color pattern and button layout may vary slightly from the above image.

 

View full post on Become007.com

CellAntenna announces new high power RF Multiband Remote Unit for use in mobile phone jamming and managed access applications

Top Priority Sector:  communications Coral Springs, FL-based CellAntenna Corporation, a provider of solutions to enhance and prohibit cell phone signals, has announced its latest product for jamming and managed access, the High Power Multiband Remote Unit (CA-MBRU-HP) providing 100 Watts per band combined to a single output port. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Hackers hit more businesses through remote access accounts

Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks. View full post on Computerworld Cybercrime and Hacking News ________________ Other Sites You May Like: Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers hit more businesses through remote access accounts appeared first on National Cyber Security.

View full post on National Cyber Security

A recently reported loophole in the AVG Remote Management

AVG is a well-known security retailer and this time, it is only going to cover one weakness, which is discovered in its remote administration products. However, the security firm, which has found the loopholes, has strongly criticized it. AVG Remote Management is the security software, which is installed on the networked computer, is highly questionable, these days. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post A recently reported loophole in the AVG Remote Management appeared first on National Cyber Security.

View full post on National Cyber Security

Arab hactivist use remote access Trojan to hack 24,000 machines worldwide.

http://2.bp.blogspot.com/-lyh8ULu4Ms8/UkQBfpHbyiI/AAAAAAAAAyQ/SCvRN7VpRkk/s1600/njRAT+v0.6.4.gif 

Symantec threat lab researchers say Arab Hackers based in Middle East are targeting the computers world wide using remote access Trojan njRAT. There are 487 groups involved in certain hacking campaign. 

Symantec says, “Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have different motivations, which can be broadly classed as hacktivism, information theft and botnet building,” njRAT is a fairly simple malware widely available in Black Markets. 

The malware grants hackers basic powers, such as the ability to download and execute additional malware on infected systems, execute shell commands, read and write registry keys, capture screenshots, log keystrokes and hijack control of webcams. 

Researchers say these attacks originate from Middle East and nearly 80% of CnC base located in Egypt, Palestine and Lebiya.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Critical vulnerability in cURL library allow remote code execution attacks

A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks. View full post on The Hacker News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Network Security Engineer (100% Remote)

Details: Network Security Engineer REMOTE POSITION *****ACTIVELY INTERVIEWING!!!*****  A large established industry leader is currently looking to bring a Network Security Engineer on their team who has a background in Information Security.  You will be working on a top priority company wide project while gaining experience working with top of the line technology.    The Network Security […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Page 1 of 712345»...Last »

My Twitter

  • RT @GregoryDEvans: Website/IP https://t.co/LkGHBGYy9S may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/FBEwOqgUxG
    about 15 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/LkGHBGYy9S may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/FBEwOqgUxG #security #…
    about 15 mins ago
  • @GregoryDEvans You've been quoted in my #Storify story "Conozca los tipos de desarrolladores que existen" https://t.co/ahoB2ZhFln
    about 2 days ago
  • Cyber Security News Today is out! https://t.co/NZKBy2kROK @gregorydevans #hacker
    about 3 days ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/i9wU6iYIef may be hackable #hacked, #WGH, #USA, #hackerproof https://t…
    about 4 days ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans