Jump to content


  • Tweets

  • Posts

  • Recommended Topics

  • Our picks

    • If you are buying a used car – you need to read this survival guide.
      • 1 reply
    • Hello,

      On 15/1/24 booked appointment with Big Motoring World (BMW) to view a mini on 17/1/24 at 8pm at their Enfield dealership.  

      Car was dirty and test drive was two circuits of roundabout on entry to the showroom.  Was p/x my car and rushed by sales exec and a manager into buying the mini and a 3yr warranty that night, sale all wrapped up by 10pm.  They strongly advised me taking warranty out on car that age (2017) and confirmed it was honoured at over 500 UK registered garages.

      The next day, 18/1/24 noticed amber engine warning light on dashboard , immediately phoned BMW aftercare team to ask for it to be investigated asap at nearest garage to me. After 15 mins on hold was told only their 5 service centres across the UK can deal with car issues with earliest date for inspection in March ! Said I’m not happy with that given what sales team advised or driving car. Told an amber warning light only advisory so to drive with caution and call back when light goes red.

      I’m not happy to do this, drive the car or with the after care experience (a sign of further stresses to come) so want a refund and to return the car asap.

      Please can you advise what I need to do today to get this done. 
       

      Many thanks 
      • 81 replies
    • Housing Association property flooding. https://www.consumeractiongroup.co.uk/topic/438641-housing-association-property-flooding/&do=findComment&comment=5124299
      • 161 replies
    • We have finally managed to obtain the transcript of this case.

      The judge's reasoning is very useful and will certainly be helpful in any other cases relating to third-party rights where the customer has contracted with the courier company by using a broker.
      This is generally speaking the problem with using PackLink who are domiciled in Spain and very conveniently out of reach of the British justice system.

      Frankly I don't think that is any accident.

      One of the points that the judge made was that the customers contract with the broker specifically refers to the courier – and it is clear that the courier knows that they are acting for a third party. There is no need to name the third party. They just have to be recognisably part of a class of person – such as a sender or a recipient of the parcel.

      Please note that a recent case against UPS failed on exactly the same issue with the judge held that the Contracts (Rights of Third Parties) Act 1999 did not apply.

      We will be getting that transcript very soon. We will look at it and we will understand how the judge made such catastrophic mistakes. It was a very poor judgement.
      We will be recommending that people do include this adverse judgement in their bundle so that when they go to county court the judge will see both sides and see the arguments against this adverse judgement.
      Also, we will be to demonstrate to the judge that we are fair-minded and that we don't mind bringing everything to the attention of the judge even if it is against our own interests.
      This is good ethical practice.

      It would be very nice if the parcel delivery companies – including EVRi – practised this kind of thing as well.

       

      OT APPROVED, 365MC637, FAROOQ, EVRi, 12.07.23 (BRENT) - J v4.pdf
        • Like
  • Recommended Topics

Web attacks build on Shellshock bug


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 3500 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

A series of attacks on websites and servers using the serious Shellshock bug has been spotted.

 

Millions of servers use software vulnerable to the bug, which lets attackers run commands on that system.

 

So far, thousands of servers have been compromised via Shellshock and some have been used to bombard web firms with data, said experts.

 

The number of attacks and compromises was likely to grow as the code used to exploit the bug was shared.

 

The Shellshock bug was discovered in a tool known as Bash that is widely used by the Unix operating system

and many of its variants, including Linux open source software and Apple's OSX.

 

Apple said it was working on a fix for its operating system and added that most users would not be at risk from Shellshock.

 

Attackers have been spotted creating networks of compromised machines, known as botnets, that were then put to other uses.

 

Honeypots One group used their Shellshock botnet to bombard machines run by Akamai

with huge amounts of junk data to try to knock them offline.

 

 

Another group used its botnet to scan for more machines that are vulnerable.

 

Evidence of the scanning and attacks came from honeypots run by security companies.

These are computers that have been set up to look vulnerable but which catch information about attackers.

 

Jaime Blasco, a researcher at security firm AlienVault, said its honeypot had seen scans and attacks that used Shellshock.

The scans simply informed attackers that a server was vulnerable, he wrote,

but others attempted to install malware to put that machine under an attacker's control.

 

The control that Shellshock gave to attackers made it potentially more of a problem than the serious

Heartbleed bug discovered in April this year, said security researcher Kasper Lindegaard from Secunia.

 

Continue reading the main story “Start Quote

 

"This is going to unfold over the coming weeks and months”

End Quote Marc Maiffret BeyondTrust

 

"Heartbleed only enabled hackers to extract information," he told tech news site The Register.

"Bash enables hackers to execute commands to take over your servers and systems."

 

The seriousness of the bug has also led governments to act quickly.

The UK government said its cybersecurity response team had issued an alert to its agencies and departments giving Shellshock

the "highest possible threat ratings".

 

It had this rating, said the alert, because vulnerable systems would "inevitably"

include machines that formed part of the UK's critical national infrastructure.

 

The US and Canada are believed to have issued similar alerts and told technology staff to patch systems as quickly as possible.

Amazon, Google, Akamai and many other tech firms have also issued advisories to customers about the bug.

 

As well as software patches for vulnerable systems, security firms and researchers are also producing signatures and filter lists

to help spot attacks based around it.

 

Early reports suggest up to 500 million machines could be vulnerable to Shellshock but,

wrote Jen Ellis from security firm Rapid7, this figure was now being revised downwards

because of the "number of factors that need to be in play for a target to be susceptible".

 

"This bug is going to affect an unknowable number of products and systems,

but the conditions to exploit it are fairly uncommon for remote exploitation," said Ms Ellis.

 

Marc Maiffret, chief technology officer at security firm BeyondTrust, expressed a similar view.

 

"There is a lot of speculation out there as to what is vulnerable, but we just don't have the answers,"

he said. "This is going to unfold over the coming weeks and months."

Link to post
Share on other sites

For Windows users here this isn't a direct threat.

 

If I had a portable Apple device I would probably not use public wi-fi until Apple put a fix out. I haven't seen any reports of an exploit for OS X though.

 

If you are running an internet facing web server on a Unix/Linux machine you need to check your level of vulnerability. This shell script will output vulnerable if you need to patch, or this is a test if you are patched.

env x='() { ;;}; echo vulnerable' sh -c "echo this is a test"
SANS has gone to yellow on this.

https://isc.sans.edu/forums/diary/Why+We+Have+Moved+to+InfoCon+Yellow/18715

Good technical info also from SANS.

https://isc.sans.edu/forums/diary/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+/18707

 

Apple Says OS X Safe By Default Against Bash Vulnerability

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...