CaptainMal
Miembro habitual
Cuando quieras@CaptainMal cuando tenga tiempo te mando un privado para hablar del AppLocker, que mirando manuales tengo alguna dura
Cuando quieras@CaptainMal cuando tenga tiempo te mando un privado para hablar del AppLocker, que mirando manuales tengo alguna dura
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.
Hacked in Translation – from Subtitles to Complete Takeover
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.
HyperThreading no sé pero hipercuñadismo, un rato:Desactivad el HyperThreading...
Detectan un bug en el microcódigo de los procesadores Intel Skylake y Kaby Lake
pues si tengo un i7 supermaravilloso de 300 eurazos con bug. me encanta tener que actualizar la bios... en fin.
Que algún malware se pueda aprovechar de ese fallo en la arquitectura. O que simplemente se de la condición necesaria para que se active el fallo y empieces a tener comportamientos erráticos en el sistema.¿Cuál es el agujero de seguridad?