Monthly Archives: April 2013

Using a Linksys Wi-Fi router? Prepare to be attacked on the Internet.

At least one model of Linksys router, the Linksys EA2700 Network Manager N600 Wi_Fi Wireless-N Router, has extensive and critical vulnerabilities that will allow an attacker to remotely change the router’s administration passwords, control your entire Internet experience, intercept and read all communication going across the router (including passwords to websites!), and attack the computers behind the router at will. Unfortunately, because the same firmware (the software used to run the router) is used across many different Linksys routers for the last several years, all Linksys routers purchased within the last three to five years must be considered at risk. This is a major risk to your Internet connectivity that can only be fixed by either replacing the router with one from a different manufacturer, or installing a custom open-source firmware from a third party. Continue reading

Read More…
Posted in Hardware Vulnerabilities | Tagged , , , , | Leave a comment

Web Browser threat: Trojan Horse mimics a Flash Player update

This latest threat actually has nothing to do with Adobe’s Flash product, but mimics as an updater for that product. You get attacked as you surf the Internet. Specifically, this is what is known as a “drive-by attack” – you just have to visit a malicious website, or an innocent website which has been compromised, and this attack will happen as you “drive by” with your web browser. As a Trojan Horse, it tricks you into thinking that it is a legitimate installer by mimicking the installer of a well-known software vendor. Continue reading

Read More…
Posted in Malware | Tagged , , , , | Leave a comment