ter

spyterms.q

-=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- =========================




ter

Hidden Messages Buried In VoIP Chatter





ter

Security Consultant Granted Bail After Hacking GoGet Systems







ter

Mythbusters RFID Episode Axed After Pressure From Credit Card Firms




ter

Feds At DefCon Alarmed After RFIDs Scanned





ter

Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.






ter

Taboola Hack Allows SEA To Redirect Reuters Site Visitors







ter

Hyperion Runtime Encrypter 2.0

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".




ter

Hyperion Runtime Encrypter 2.3

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".




ter

Avaya IP Office Customer Call Reporter Command Execution

This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.




ter

AfterLogic WebMail Pro ASP.NET Account Takeover / XXE Injection

AfterLogic WebMail Pro ASP.NET versions prior to 6.2.7 suffer from an administrator account takeover via an XXE injection vulnerability.





ter

Mysterious DDoS Attacks Hit Dutch Banks





ter

IoT Malware Forces Wi-Fi Routers To Join Botnet Army








ter

IBM Supercomputer Breaks Speed Record




ter

IBM To Build Brain-Like Computers




ter

IBM Announces Computer Memory Breakthrough




ter

Hands-On With The IBM 5150, Thirty Years Later




ter

IBM Designs Computer Chip That Copies How The Brain Works








ter

Transfer Master 3.3 Denial Of Service

Transfer Master version 3.3 for iOS suffers from a denial of service vulnerability.










ter

Lulzbuster 1.0.0

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.