A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Current Activities

Lenovo Superfish Vulnerability

SuperFish Vulnerability discovered in Lenovo personal computer pre-installed with SuperFish Visual Discovery Software, SuperFish intercepts HTTP(S) traffic using a self-signed root certificate. These updates address vulnerability that could allow an attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the …

Read More »

Mozilla Security Updates

Mozilla Security Updates The Mozilla Foundation has release security updates to address multiple vulnerabilities in Firefox, Firefox ESR and Thunderbird. These updates address vulnerabilities that could allow an attacker to obtain sensitive information or execute arbitrary code on an affected system. The following updates are available: . Firefox 36 . …

Read More »

Security Updates for BIND

The Internet Systems Consortium (ISC) has released security updates for BIND. These updates address vulnerability that could potentially allow an attacker to cause a denial of service condition. The following update is available:- . BIND 9.9.6-P2 . BIND 9.10.1-P2 Users and administrators are encouraged to review the ISC Knowledge Base …

Read More »

Security Update for Google Chrome

Google has released Chrome OS 40.0.2214.114 for Chrome devices. This update addresses multiple vulnerabilities (e.g. Use-after-free in DOM [CVE-2015-1209], Cross-origin-bypass in V8 bindings [CVE-2015-1210], Privilege escalation using service workers [CVE-2015-1211]) that could allow an attacker to cause a denial of service condition or obtain personal information. Users and administrators are …

Read More »

Security Update for Internet Explorer

Microsoft has released security update for Internet Explorer. This update addresses vulnerabilities exist when Internet Explorer improperly accesses objects in memory. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system if a user views a specially crafted webpage using Internet Explorer. Affected Software:- …

Read More »

Subscribe to Receive Regular Updates


A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe