Friday, August 14, 2015
A new loophole in the net millions of flash gallery router hacked
In light of the spread routers in order to re-throughput Internet routing and distributed to all computers or smart phones the latter did not recognize their vulnerability to piracy and hack as it had appeared new loophole through which to penetrate millions of Alroatr which means that a very large number of houses and shops and companies are not in terms of safety that this gap has not yet been processed and has made many researchers warn all users of their devices Alroatr control well so as not to exploit the wake of the presence of this gap.
The problem lies in a flash the net or the so-called NetUSB where it has been exstrophy that it contains a defect displays them in any moment of penetration, and here we are not talking about flash Net or NetUSB certain but there is a large group of major companies related to the subject where the flaw lies in all of the company KCodes NetUSB and NetUSB based in Taiwan and are certified by many of the major communications companies in the company around the world.
When the flash is connected with the net router to redirect Internet, whether by D-Link, Netgear, TP-Link, ZyXEL, TrendNet the bugs as soon as you begin the process of communication as it is done so that the computer connects to the server on the network (TCP port 20005 ) in order to complete and connect the contact gap and work through the SEC company during the analysis NetUSB across TP-Link device for approval to establish a connection to the server that provides you with the Internet and for that to happen you must first be AES encryption key, and there are many security experts and protection believe that this process does not benefit them at all because the key originally AES is present in most popular operating systems such as Windows as well as they believe that this may cause damage to the immense because the penetration NetUSB could allow the hacker the possibility of implementing a number of malicious code computer may lead to perdition It also can take advantage of this loophole in order to carry out espionage and of course, no one wants to be spying on it.
Also a large group of researchers in KCodes NetUSB company and SEC company believe that the reason for this is all due to go beyond the specific capacity of the temporary inventory and devices affected by this issue are:
ALLNET, Ambir Technology, AMIT, Asante, Atlantis, Corega, Digitus, D-Link, EDIMAX, Encore Electronics, EnGenius, HawkingTechnology, IOGEAR, LevelOne, LONGSHINE, NETGEAR, PCI, PROLiNK, Sitecom, TP-LINK, TRENDnet, Western Digital , ZyXEL
The problem lies in a flash the net or the so-called NetUSB where it has been exstrophy that it contains a defect displays them in any moment of penetration, and here we are not talking about flash Net or NetUSB certain but there is a large group of major companies related to the subject where the flaw lies in all of the company KCodes NetUSB and NetUSB based in Taiwan and are certified by many of the major communications companies in the company around the world.
When the flash is connected with the net router to redirect Internet, whether by D-Link, Netgear, TP-Link, ZyXEL, TrendNet the bugs as soon as you begin the process of communication as it is done so that the computer connects to the server on the network (TCP port 20005 ) in order to complete and connect the contact gap and work through the SEC company during the analysis NetUSB across TP-Link device for approval to establish a connection to the server that provides you with the Internet and for that to happen you must first be AES encryption key, and there are many security experts and protection believe that this process does not benefit them at all because the key originally AES is present in most popular operating systems such as Windows as well as they believe that this may cause damage to the immense because the penetration NetUSB could allow the hacker the possibility of implementing a number of malicious code computer may lead to perdition It also can take advantage of this loophole in order to carry out espionage and of course, no one wants to be spying on it.
Also a large group of researchers in KCodes NetUSB company and SEC company believe that the reason for this is all due to go beyond the specific capacity of the temporary inventory and devices affected by this issue are:
ALLNET, Ambir Technology, AMIT, Asante, Atlantis, Corega, Digitus, D-Link, EDIMAX, Encore Electronics, EnGenius, HawkingTechnology, IOGEAR, LevelOne, LONGSHINE, NETGEAR, PCI, PROLiNK, Sitecom, TP-LINK, TRENDnet, Western Digital , ZyXEL
Labels:
news
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment