The Broadband Guide
SG
search advanced
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

 Username:
 Password:
Register
 forgot password?

Security Information

This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.



SG Security Scan

The SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.

SG Security Scanner
Vulterable Ports
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports

 

SG Security Articles

General Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows
Why encrypt your online traffic with VPN ?



Latest Threats - Symantec

Downloader.Tenirem - (2015.07.28) Risk Level: Very Low. Type: Trojan.
Backdoor.Cobrike - (2015.07.28) Risk Level: Very Low. Type: Trojan.
W97M.APMP - (2015.07.28) Risk Level: Very Low. Type: Trojan.
W97M.Sillycopy s1 - (2015.07.28) Risk Level: Very Low. Type: Trojan.
Backdoor.Spedear - (2015.07.26) Risk Level: Very Low. Type: Trojan.
Trojan.Rikamanu - (2015.07.26) Risk Level: Very Low. Type: Trojan.
Android.Gupno - (2015.07.22) Risk Level: Very Low. Type: Trojan.
Trojan.Mambashim - (2015.07.23) Risk Level: Very Low. Type: Trojan.
Exp.CVE-2015-2426.A - (2015.07.21) Risk Level: Very Low. Type: Trojan.
Backdoor.Darksun.B - (2015.07.21) Risk Level: Very Low. Type: Trojan.

 

Latest Security Advisories (US-CERT)


Internet Systems Consortium ISC Releases Security Updates for BIND (2015.07.28)
Original release date: July 28, 2015

ISC has released security updates to address a vulnerability in BIND. Exploitation of this vulnerability may allow a remote attacker to cause a denial of service condition.

Updates available include:

  • BIND 9-version 9.9.7-P2
  • BIND 9-version 9.10.2-P3

Users and administrators are encouraged to review ISC Knowledge Base Article AA-01272 and apply the necessary updates.




Stagefright Android Vulnerability (2015.07.28)
Original release date: July 28, 2015

Android devices running Android versions 2.2 through 5.1.1_r4 contain vulnerabilities in the Stagefright media playback engine. Exploitation of these vulnerabilities may allow an attacker to access multimedia files or potentially take control of a vulnerable device.

Users and administrators are encouraged to review Vulnerability Note VU#924951 for more information. US-CERT recommends affected Android users contact their wireless carrier or device manufacturer for a software update.




Fiat Chrysler Automobiles FCA Uconnect Vulnerability (2015.07.27)
Original release date: July 27, 2015

A vulnerability affecting the Uconnect software from FCA has been reported. Exploitation of this vulnerability may allow an unauthorized user to take remote control of an affected vehicle, but the attack requires access to Sprint's cellular network, which connects FCA vehicles to the Internet. Sprint has blocked the port used for attacks. FCA and the National Highway Transportation Safety Administration (NHTSA) have also initiated a safety recall for all potentially affected Chrysler, Dodge, Jeep, and Ram models. See the NHTSA recall announcement for a complete list.

US-CERT recommends that users review ICS Alert 15-203-01 and Vulnerability Note VU#819439 for more information. Uconnect users are encouraged to review the NHTSA recall announcement and apply the software update.




WordPress Releases Security Update (2015.07.23)
Original release date: July 23, 2015

WordPress 4.2.2 and prior versions contain critical cross-site scripting vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected website.

Users and administrators are encouraged to review the WordPress Security and Maintenance Release and upgrade to WordPress 4.2.3.




Cisco Releases Security Updates (2015.07.23)
Original release date: July 23, 2015

Cisco has released security updates to address vulnerabilities in its Application Policy Infrastructure Controller, IOS software, and the Unified MeetingPlace Conferencing products.Exploitation of these vulnerabilities may allow a remote attacker to gain unauthorized access, cause a denial-of-service condition, or take control of the affected application.

US-CERT encourages users and administrators to review the Cisco Security Advisories cisco-sa-20150722-apic, cisco-sa-20150722-tftp, and cisco-sa-20150722-mp and apply the necessary updates.




Google Releases Security Update for Chrome (2015.07.21)
Original release date: July 21, 2015

Google has released Chrome version 44.0.2403.89 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an attacker to take control of an affected system.

Users and administrators are encouraged to review the Chrome Releases page and apply the necessary update.




Microsoft Releases Security Update (2015.07.20)
Original release date: July 20, 2015

Microsoft has released a security update to address a critical vulnerability in Windows. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review Microsoft Security Bulletin MS15-078 and apply the necessary update.




Oracle Releases July 2015 Security Advisory (2015.07.14)
Original release date: July 14, 2015

Oracle has released security fixes to address 193 vulnerabilities as part of its quarterly Critical Patch Update. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review the Oracle July 2015 Critical Patch Update and apply the necessary updates.




 

top
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About