Security: KAISER, Coppersmith Attack, Updates, and Web Threats

  • KAISER: hiding the kernel from user space

    Since the beginning, Linux has mapped the kernel’s memory into the address space of every running process. There are solid performance reasons for doing this, and the processor’s memory-management unit can ordinarily be trusted to prevent user space from accessing that memory. More recently, though, some more subtle security issues related to this mapping have come to light, leading to the rapid development of a new patch set that ends this longstanding practice for the x86 architecture.

  • Security updates for Wednesday
  • ROCA: Return Of the Coppersmith Attack

    On October 30, 2017, a group of Czech researchers from Masaryk University presented the ROCA paper at the ACM CCS Conference, which earned the Real-World Impact Award. We briefly mentioned ROCA when it was first reported but haven’t dug into details of the vulnerability yet. Because of its far-ranging impact, it seems important to review the vulnerability in light of the new results published recently.

  • Some Websites Are Mining Cryptocurrency Using Your CPU Even When You Close Browser

    The advent of cryptocurrencies was bound to spark the interest of cybercriminals who are always looking to exploit some technology to steal some clicks or install malware. In the recent times, we’ve come across reports of a huge number of websites using your PCU power to mine cryptocurrency; the browser extensions and Android apps aren’t untouched by this epidemic. Developers have also come up with different options to ban this practice altogether.

    In the previous research work conducted by security firms, it was found that a miner could be run as long as the browser was running; close the browser and mining activity stops. However, as per the latest technique spotted by Malwarebytes, some dubious website owners can mine digital coins like Monero even after browser window is closed.

  • Top 10 Common Hacking Techniques You Should Know About

    Using simple hacks, a hacker can know about your personal unauthorized information which you might not want to reveal. Knowing about these common hacking techniques like phishing, DDoS, clickjacking etc., could come handy for your personal safety.

read more

You may also like...