Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Tag: cyber security

Tag Archives: cyber security

Home » Tag: cyber security

Remote Code Execution Vulnerability: What is it and how to stay protected from it?

  • Remote Code Execution (RCE) Vulnerability could allow an attacker to gain full control of a victim’s infected machine.
  • An attacker gaining access to a victim’s machine exploiting the RCE vulnerability can execute system commands, write, modify, delete or read files, and can connect to databases.

Remote code execution vulnerability allows an attacker to gain access to a victim’s machine and make changes, irrespective of where the machine is geographically located. This vulnerability can lead to a full compromise of the infected machine.

RCE vulnerabilities can provide an attacker with the ability to execute malicious code and take complete control of an infected system with the privileges of the victim running the application.

After gaining access to the system, attackers will often attempt to elevate their privileges. Once the attacker remotely executes malicious code on a vulnerable system and gains access to the infected system, he can execute system commands, write, modify, delete or read files, and can connect to databases.

Example of RCE Vulnerability

One example of a Remote Code Execution vulnerability is the CVE-2018-824vulnerability. This vulnerability is also known as ‘Microsoft Excel Remote Code Execution Vulnerability’. This vulnerability could allow an attacker to run malware on a vulnerable computer.

An attacker exploiting this vulnerability could take full control of the victim’s machine when the victim logs on to the machine with administrative user privileges. Once the system is compromised, the attacker could view, modify or delete data, install programs, as well as create new accounts with full user privileges.

According to Microsoft, there can be two delivery methods to exploit this CVE-2018-8248 vulnerability,

  • One delivery method could be in the form of a phishing email with a Microsoft Excel attachment that contains a specially crafted malicious file.
  • Another method is via web-based attack, where an attacker could host a compromised website that accepts or hosts user-provided content containing a malicious file designed to exploit the CVE-2018-8248 vulnerability.

In both the scenarios, malicious email and web-based attack, the attacker has to persuade users to click on the attachment or a link to open the malicious file. This vulnerability has been fixed by Microsoft.

How to protect your computer from RCE Vulnerability?

  • The best way to protect a computer from a remote code execution vulnerabilityis to fix loopholes that could allow an attacker to gain access.
  • To protect a computer from such vulnerability, users must periodically update their software and must keep their system up-to-date.
  • If your organization is using servers that have software which is vulnerable to remote code execution, then the latest software security patch should be applied.
  • Moreover, it is best to automate server patching in order to prevent remote code execution attacks.
  • It is recommended not to open any file or attachment from an anonymous sender.
  • Another best option would be to not use functions such as eval and to not allow anyone to edit the content of files that might be parsed by the respective languages.
  • In order to protect a computer from RCE, you should not allow a user to decide the name and extensions of files.
  • To prevent RCE, you should not sanitize user input and should not pass any user-controlled input inside evaluation functions or callbacks.
  • It is also recommended to not blacklist special characters or function names.

A Twitter Bug Left Android Users’ Private Tweets Exposed For 4 Years

Twitter just admitted that the social network accidentally revealed some Android users’ protected tweets to the public for more than 4 years — a kind of privacy blunder that you’d typically expect from Facebook.

When you sign up for Twitter, all your Tweets are public by default, allowing anyone to view and interact with your Tweets. Fortunately, Twitter also gives you control of your information, allowing you to choose if you want to keep your Tweets protected.

Enabling “Protect your Tweets” setting makes your tweets private, and you’ll receive a request whenever new people want to follow you, which you can approve or deny. It’s just similar to private Facebook updates that limit your information to your friends only.

In a post on its Help Center on Thursday, Twitter disclosed a privacy bug dating back to November 3, 2014, potentially caused the Twitter for Android app to disable the “Protect your Tweets” setting for users without their knowledge, making their private tweets visible to the public.

The bug only got triggered for those Android users who made changes to their Twitter account settings, such as changing their email address or phone number associated with their account, using the Android app between November 3, 2014, and January 14, 2019.

Apparently, on January 14, 2019, Twitter rolled out an update for Android application to fix the programming blunder.

Although Twitter did not specify exactly how many Android users were affected by this issue, 4 years is a long time duration, and it’s likely that most users have changed their account settings at least once in that period.

Twitter said the company has reached out to users whom it knows has been affected by the privacy bug.

But since Twitter “can’t confirm every account that may have been impacted,” if you are using Twitter for Android app and your tweets are supposed to be protected, it is definitely a good idea to head on to the “Privacy and Safety” settings of your app and double-check the settings to make sure the “Protect your Tweets” is enabled.

Desktop and iOS users can breathe a sigh of relief, as they were not affected by the bug.

The Twitter bug revelation came at the time when the social network is already under European Union investigation for violating the new General Data Protection Regulation (GDPR) rules.

The new law gives European citizens the right to request their personal data from companies, but when Twitter turned down a researcher’s request for data related to its short URL service, the Irish Data Protection Commission (DPC) opened an investigation.

It seems that the DPC is also aware of the latest privacy bug in the Twitter for Android app, and according to Bloomberg, the commission is currently looking into the matter.

Read More »

Information Security - InfoSec - Cyber Security - Firewall Support Providers Company in India

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India, Welcome to IT Monteur's Firewall Firm, India's No1 Managed Enterprise Network Security Firewall Support Provider Company in India, Firewall Firm Provider Complete range of Juniper Firewall Support , Cisco Firewall Support , Check Point Firewall Support , Palo Alto Firewall Support , FortiGate Firewall Support , Forcepoint Firewall Support , Sophos Firewall Support , WatchGuard Firewall Support , Baracuda Firewall Support , SonicWall Firewall Support , Gajshield Firewall Support , Seqrite Firewall Support , Firewall , Hardware Firewall , Software Firewall , Firewall India , Firewall , Network Firewall , Firewall Support , Firewall Monitoring , Firewall VPN , WAF Website Firewall , Firewall Security , Firewall India , Firewalls Support Provider in India , Firewall Support Services Provider Company in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket