The teenage author of the Mikeyy and StalkDaily worms that hit Twitter users hard one weekend ago appears to have struck lucky. As a result of his infamy, he has a brand new job.
The teenage author of the Mikeyy and StalkDaily worms that hit Twitter users hard one weekend ago appears to have struck lucky. As a result of his infamy, he has a brand new job.In a move that is likely to disgust many who are involved in protecting computers against security threats, a Web applications development company called ExqSoft Solutions has hired 17-year-old Mikeyy Mooney.
Interestingly, Travis Rowland, CEO of ExqSoft Solution, was quick to publicize Mooney's signing:
In my opinion, ExqSoft Solutions was utterly irresponsible in offering Mooney the job and publicizing his acceptance -- less than a week after the first wave of attacks.
The last thing we want is a legion of other kids exploiting software and Websites in the hope they, too, might be rewarded with a job offer.
Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his other blog on the Sophos website you can find him on Twitter at @gcluley. Special to Dark Reading.
5 Emerging Cyber Threats to Watch for in 2019Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
How Enterprises Are Attacking the Cybersecurity ProblemData breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability DatabaseCVE-2019-8354 PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.