Multiple Vulnerabilities in IBM QRadar SIEM Allows Attackers to Escalate Privileges and to Execute Arbitrary Commands

Multiple Vulnerabilities found in IBM QRadar chained together allows a remote attacker to bypass authentication and to execute arbitrary commands with root privileges. The IBM QRadar is an enterprise security information and event management (SIEM) product that collects the logs from log data from Operating system, Vulnerabilities, user activities, behaviors and networking devices. It can […]

IBM Developing World’s Tiniest Computer Smaller than a Grain of Salt

At Think 2018, IBM has announced developing world’s tiniest computer that will cost less than ten cents to manufacture and can monitor, analyze, communicate, and even act on data.  Think 2018 is IBM’s flagship annual conference that commenced on March 19. At the event, the company introduced its newest, innovative ventures including the first prototype […]

6 Critical RCE and Buffer Overflow Vulnerabilities in IBM Informix Dynamic Server and Informix Open Admin Tool

IBM Informix Dynamic Server and Informix Open Admin Tool contains 6 Critical Vulnerabilities including RCE and a Buffer overflow in HEAP. IBM Informix Dynamic Server for high-volume online Data server for transaction processing (OLTP), integrated applications, and now breathtakingly fast data warehouse/analytical workloads. IDS is well known for its hands-free administration. To make server administration even […]

IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware

IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code. The USB flash drive is said to store the Initialization Tool for IBM Storwize, a big data storage system (rack-based disks system) for data centers. The part number of the infected […]

IBM Sent Off USB Sticks Infected with Malware

A new warning has been issued by IBM and the situation seems to be rather serious. According to the firm, there are a number of infected USB sticks out there with some very dangerous malware. The USB sticks in question were shipped with Storwize flash and they have hybrid storage systems. IBM suggests destroying the USB sticks […]

Android Malware Developer Contacts IBM; Demands Blog Post Correction

IBM contacted by Bilal Bot Developer for Publishing Incorrect Details about his Malware. It’s definitely one crazy turn of events. The supposed author of malicious Trojan Bilal Bot has condemned IBM security staff for publishing incorrect information about his malware and even offered his services to correct the write-up. Limor Kessem, the security expert at […]

Tanmay, World’s Youngest IBM Watson Programmer, Started Coding At The Age Of Five

Short Bytes: Today, I’m going to tell you about 12-year-old app developer Tanmay Bakshi, who is making headlines after his recent talk at IBM Developer Connect In Bengaluru. He has developed an IBM Watson-based algorithm named AskTanmay, which is also the world’s first Web-Based NLQA system. Tanmay Bakshi, who lives in Canada, is the world’s youngest IBM […]

Here’s Your Chance to Use IBM’s Remotely Accessible Quantum Computer

Quantum Computing- No More a Thing of Distant Future — IBM wants us all to use it remotely accessible Quantum Computer… for free! Researchers have been working to decode quantum computing for probably decades and it is time now to reap the fruits of the sowed seeds, that is, now we can expect to make use […]

Indian Coder Shows How To Make IBM’s $1.4 million Randomized App In 4 Minutes

Short Bytes: An Indian techie, Sandesh Suvarna, has shown how to make IBM’s $1.4 million Randomizer app within 4 minutes. IBM made this app for the US Government’s airport security agency to indicate random directions to the people. You might have heard about the buzz surrounding the US Government’s airport security agency’s decision to ask […]

IBM Researchers Hack Into A Smart Building To Highlight The Backdoors Created For Hackers

This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning that building automation systems used to power so-called “smart buildings” pose a security risk to companies. According to Gartner, devices in smart homes and smart commercial buildings represented 45 percent of total connected […]

Now Run Apple’s Swift Programming Language Online In IBM Swift Sandbox

Short Bytes: To make learning Apple’s programming language Swift easier, IBM has launched an online Swift Sandbox. Here, you can write and run Swift programs and execute them on top of Linux. Just a couple of days ago, Apple made its Swift programming language open source. Apple released the language last year at WWDC 14 […]

Hackers Use Malware To Steal Cisco, IBM and Oracle Certification Manager

A certification tracking system (Credential Manager System) used by companies like Cisco, F5, IBM and Oracle has faced a data breach and sensitive data might have been accessed by the hackers. An announcement made by Pearson VUE (Computer-Based Test (CBT) development and delivery) said a malware was placed on the server of the tracking system […]

IBM’s Security Report Suggests Users To Avoid TOR

Security researchers have suggested that corporations and enterprises should block all of the encrypted and anonymised traffic that they are receiving through a network called The Onion Router (widely known as TOR) in an attempt to secure their corporate networks …… And also to prevent themselves from becoming legally responsible for cyber attacks, distribution of […]

IBM: Hackers are Using Tor Network More Frequently For Launching Hacking Attacks

Short Bytes: A report from IBM researchers has shown that the use of Tor network is on the rise. As a result, the growth of malicious traffic and hacking attacks originating from the Tor network is higher than ever. The United States government helped in the creation of The Onion Router and it funds it regularly for its development. Many […]

IBM Open Sources 50 Projects, Launches developerWorks Open

Short Bytes: Technology pioneer IBM has open sourced 50 tools and apps. These tools cover a large interest area varying from Cloud, Analytics, IoT, Mobile, Security, Social, Watson and more. The company has also launched developerWorks Open, a community to empower open source and IBM’s homegrown technologies. As the voice to make the web a more open […]

IBM Sued by Its Own Shareholder for Cooperating with the NSA

It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can see from several tech giants and business institutions  who cooperated with the American National Security Agency (NSA) for its spying and surveillance project PRISM. These companies are now loosing billions of dollars and most […]

New IBM system adds “robust” security to smartphone banking and shopping

Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a new, advanced Trojan, Hesperbot. But a new IBM system may help secure smartphones – by using near-field communications chips (NFC) for an additional layer of security. It’s the first system to allow “two-factor”