
MySQL Design Flaw can be leveraged to steal sensitive information
MySQL has released a security statement providing the following information:
The LOAD DATA
statement can load a file located on the server host, or, if the LOCAL
keyword is specified, on the client host.
There are two potential security issues with the LOCAL
version of LOAD DATA
:
- The transfer of the file from the client host to the server host is initiated by the MySQL server. In theory, a patched server could be built that would tell the client program to transfer a file of the server’s choosing rather than the file named by the client in the
LOAD DATA
statement. Such a server could access any file on the client host to which the client user has read access. (A patched server could in fact reply with a file-transfer request to any statement, not justLOAD DATA LOCAL
, so a more fundamental issue is that clients should

Free vs Paid Antivirus Software: Which Is Better?
Discover the ultimate showdown between free and paid antivirus software. Unveil the pros, cons, and find out which option reigns supreme in protecting your digital world.
Introduction
In today’s digital age, where cyber threats are becoming increasingly sophisticated, protecting your devices and personal information is of utmost importance. Antivirus software plays a crucial role in safeguarding your digital life from malware, viruses, and other malicious activities. When it comes to antivirus software, users often find themselves faced with the choice between free and paid options. This article aims to explore the differences between free and paid antivirus software, helping you make an informed decision to ensure optimal cybersecurity.
Are you seeking antivirus protection but hesitant to invest in paid software? Well, let me share some eye-opening facts: According to the Center for Strategic and International Studies, hacking costs the global economy a staggering 350 billion dollars annually. It’s crucial … Read the rest

Critical Cisco SMB Switch Vulnerability
This Critical Cisco vulnerability affects the following: Cisco Small Business 200 Series Smart Switches, 250 Series Smart Switches, 300 Series Managed Switches, 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, 500 Series Stackable Managed Switches and 550X Series Stackable Managed Switches.
The vulnerability (CVE-2018-15439), which has a critical base severity rating of 9.8 because the default configuration on the devices includes a default, privileged user account that is used for 1st time login and cannot be removed from the switch. The administrator can disable the account by configuring another admin account with access privilege set to level 15. If any of the previous created admin accounts are removed it re-enables the default privileged admin account without any notification.
“Under these circumstances, an attacker can use this account to log in to an affected device and execute commands with full admin rights,” Cisco explained in its advisory… Read the rest

The Best Business Antivirus for 2019
Are you switching to a new Antivirus provider? I have done some leg work to vet the following antivirus programs below. These business antivirus have the best features, such as remote installation and central management. The best business antivirus software will have enterprise-level protection against threats and many new features. I also took into consideration the best bang for the buck.
Webroot SecureAnywhereAn excellent business antivirus suite, giving you various tools such as virus protection, Firewall, Identity Theft Protection, Secure Browsing with real time anti phishing, password and login protection, Mobile Security and system optimizer.
Bitdefender GravityZone Business SecurityThis package makes reliable protection its top priority. Bitdefender products are loved by the independent testing labs, highly rated for malware detection, removal, performance and usability. Most of the features work automatically – anti-malware, firewall, web adviser, URL filtering – but you can also customize the product to control user … Read the rest

773M Credentials Found on the Dark Web
A database called Collection #1 has 773 million breached emails addresses has been found in a underground hacking forum. To date this is the largest sum of compromised accounts to year.
This database in size totals 87GB of data, it was seen being hosted on the MEGA cloud service but instantly removed after it was discovered. The data was split into 12,000 separate text files under a folder called “Collection #1” Even after the database was removed from MEGA Cloud it was instantly turned up in the Dark Web.
Check Your Email Addresses and Passwords in HIBP
Please do yourself a favor and go to https://haveibeenpwned.com/. This website will allow you to search a database hosted by HIBP that contains all the email’s and unique password’s that have ever been leaked into the dark web.

Fix slow internet speed with Intel Wireless-AC 7265 – 8265 when Sonicwall VPN enabled
Fix slow internet speed with Intel Wireless-AC 7265 – 8265 when Sonicwall VPN software is enabled and not even connected to the VPN destination. There is a glitch with the Sonicwall GVC 4.9 software running in Windows 10 version 1803 where when the software is enabled download speeds on the Intel Dual Band Wireless-AC 7265 – 8265 are super slow. To fix this issue you will need to obtain the Sonicwall GVC ( Global VPN Client ) Ver: 5.0 you can do this by opening a support ticket and requesting the installer or downloading it from the provided link.
I hope this article was helpful, if you have any questions, please feel free to contact me. If you would like to be notified of when I create a new post, you can subscribe to my blog alert.
An easy way to contribute to my blog would be to click
… Read the rest
Fortnite Hacked Via Insecure Single Sign-On
Looks like there was a single sign-on vulnerability with Fortnite that could have had hackers break into millions of accounts and steal their virtual assets. On Wednesday the researchers at Check Point found the vulnerability which is tied to the way the single-sign-on (SSO) works between PlayStation Network, Xbox Live, Nintendo, Facebook and Google and the Epic Games server. The attacker could create a malicious link using a legitimate Epic Games sub-domain to trigger the attack. I’m sure they will be on top of PR and protecting the brand. Every Game is just a Game and can be replaced. Best of luck Fortnite.… Read the rest

Bluehost and other web hosting company sites found to be full of flaws
Independent researcher and bug-hunter Paulos Yibelo has identified four vulnerabilities at the web-hosting platform Bluehost and was found to contain multiple account takeover and information leak vulnerabilities. one of which is a “High” severity information leak through CORS misconfigurations that could allow attackers to steal personally identifiable information, partial payment details and tokens which can give access to hosted WordPress, Mojo, SiteLock and others.
The site is also vulnerable to account takeover because of improper JSON request validation CSRF, Man-in-the-middle attacks due to improper validation of CORS scheme and cross scripting on my.bluehost.com, according to the Yibelo’s recent blog post.
Yibelo tested four other web hosting companies and also found cross scripting and information disclosure vulnerabilities in Dreamhost, information disclosure among other vulnerabilities in Hostgator and OVH, and account takeover and other vulnerabilities in iPage.… Read the rest

The Best Computer Maintenance Checklist
If you looking for the Best Computer Maintenance Checklist look no further. This checklist will keep your company’s laptops, desktops in top condition. A regular computer maintenance checklist can help you and your IT department tune up computers when your team is in the office, and even provide guidelines to your end users on how to take better care of their machines. Here is the best ten point checklist.
- Anti-virus: Install an anti-virus and malware protection program. Run a full scan on the computer at the initial installation to identify and remove any existing problems on the system.
- Backup: Choose and install an automated backup program like CrashPlan that connects the computer to a storage program in the cloud. Define which files need to be backed up and automate a schedule for daily backups whenever the computer is connected to the internet.
- Passwords: Improve your networks security by setting

How to Enable Windows Sandbox
The Windows Sandbox provides an isolated desktop where you can run software that might compromise your current Windows environment. Every time Windows Sandbox is started, you will be presented with a clean installation of Windows, meaning no files are preserved from the previous session.
Enable Windows Sandbox
Here are a few details before you can use Windows Sandbox. You must be running Windows 10 (18305 or later) 64-bit Pro or Enterprise SKUs, with at least 4GB of RAM, virtualization capabilities enabled in the BIOS, 1GB of free disk space, and at least 2 CPU cores.
Windows Sandbox is a built-in Windows feature which you can enable from the Control Panel.
- Open the Control Panel.
- Click Programs.
- Under Programs and Features, click Turn Windows features on or off.
- Give consent or provide an administrator password in the UAC prompt.
