Click here to Skip to main content
15,891,033 members

The Insider News

   

The Insider News is for breaking IT and Software development news. Post your news, your alerts and your inside scoops. This is an IT news-only forum - all off-topic, non-news posts will be removed. If you wish to ask a programming question please post it here.

Get The Daily Insider direct to your mailbox every day. Subscribe now!

 
NewsGoogle’s “Fuchsia” smartphone OS dumps Linux, has a wild new UI Pin
Kent Sharkey8-May-17 7:36
staffKent Sharkey8-May-17 7:36 
GeneralRe: Google’s “Fuchsia” smartphone OS dumps Linux, has a wild new UI Pin
Mark_Wallace8-May-17 16:08
Mark_Wallace8-May-17 16:08 
GeneralRe: Google’s “Fuchsia” smartphone OS dumps Linux, has a wild new UI Pin
GenJerDan8-May-17 22:00
GenJerDan8-May-17 22:00 
GeneralRe: Google’s “Fuchsia” smartphone OS dumps Linux, has a wild new UI Pin
Rob Grainger9-May-17 0:40
Rob Grainger9-May-17 0:40 
GeneralRe: Google’s “Fuchsia” smartphone OS dumps Linux, has a wild new UI Pin
Dan Neely9-May-17 2:42
Dan Neely9-May-17 2:42 
NewsGoogle 0-day hunters find 'crazy bad' Windows RCE flaw Pin
Kent Sharkey8-May-17 7:34
staffKent Sharkey8-May-17 7:34 
GeneralRe: Google 0-day hunters find 'crazy bad' Windows RCE flaw Pin
Kornfeld Eliyahu Peter8-May-17 20:56
professionalKornfeld Eliyahu Peter8-May-17 20:56 
GeneralRe: Google 0-day hunters find 'crazy bad' Windows RCE flaw Pin
Jochen Arndt8-May-17 21:09
professionalJochen Arndt8-May-17 21:09 
Microsoft has released a patch: Microsoft Security Advisory 4022344[^]

It is really bad:
Quote:
The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.

It shows again that exploiting virus scanners is the best way to infect a system beacuse those are running with high privileges.

[EDIT]
See also 1252 - MsMpEng: Remotely Exploitable Type Confusion in Windows 8, 8.1, 10, Windows Server, SCEP, Microsoft Security Essentials, and more. - project-zero - Monorail[^]:
Quote:
On workstations, attackers can access mpengine by sending emails to users (reading the email or opening attachments is not necessary), visiting links in a web browser, instant messaging and so on.
...
Vulnerabilities in MsMpEng are among the most severe possible in Windows, due to the privilege, accessibility, and ubiquity of the service.

[/EDIT]
NewsBuckaroo brings package management to C/C++ projects Pin
Kent Sharkey8-May-17 7:28
staffKent Sharkey8-May-17 7:28 
NewsResearcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Dan Neely8-May-17 3:16
Dan Neely8-May-17 3:16 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Mark_Wallace8-May-17 3:52
Mark_Wallace8-May-17 3:52 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
megaadam8-May-17 4:02
professionalmegaadam8-May-17 4:02 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Dan Neely8-May-17 4:10
Dan Neely8-May-17 4:10 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Mark_Wallace8-May-17 4:26
Mark_Wallace8-May-17 4:26 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Dan Neely8-May-17 4:30
Dan Neely8-May-17 4:30 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Mark_Wallace8-May-17 4:35
Mark_Wallace8-May-17 4:35 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
megaadam8-May-17 4:01
professionalmegaadam8-May-17 4:01 
GeneralRe: Researcher finds way to identify what videos you're streaming without any access to the datastream between you and the provider Pin
Joe Woodbury8-May-17 9:47
professionalJoe Woodbury8-May-17 9:47 
NewsHow Burger King revealed the hackability of voice assistants Pin
Kent Sharkey7-May-17 18:00
staffKent Sharkey7-May-17 18:00 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
Marco Bertschi7-May-17 19:24
protectorMarco Bertschi7-May-17 19:24 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
User 101325468-May-17 3:43
User 101325468-May-17 3:43 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
Marco Bertschi8-May-17 3:48
protectorMarco Bertschi8-May-17 3:48 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
Mark_Wallace8-May-17 3:57
Mark_Wallace8-May-17 3:57 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
Marco Bertschi8-May-17 4:00
protectorMarco Bertschi8-May-17 4:00 
GeneralRe: How Burger King revealed the hackability of voice assistants Pin
Mark_Wallace8-May-17 4:06
Mark_Wallace8-May-17 4:06 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.