21st Century Learning and Teaching
586.8K views | +23 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'IT-Admin', 'Java-vulnerabilities'. Clear
Scooped by Gust MEES
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | 21st Century Learning and Teaching | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux

 

Scooped by Gust MEES
Scoop.it!

2 Programme verursachen 78 Prozent aller Schwachstellen

2 Programme verursachen 78 Prozent aller Schwachstellen | 21st Century Learning and Teaching | Scoop.it
Die meisten Schadprogramme nutzen bekannte Lücken in populärer Software aus. Dabei handelt es sich sogar nur um ganz wenige Tools, die einen Großteil der insgesamt bekannten Sicherheitslücken auf sich versammeln.

 

Hält man diese wenigen Programme immer auf dem aktuellen Stand, dann ist der eigene Windows-Rechner bereits relativ sicher. Mit wenig Aufwand erreicht man also viel Sicherheit.

Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/