Air Canada Plane Crash at LaGuardia: Eyewitnesses Describe “Plane Cut in Half”

Image
A terrifying aviation incident unfolded at LaGuardia Airport in New York when an Air Canada flight collided with a fire truck during landing, resulting in a tragic crash that shocked passengers and witnesses alike. The aircraft, a CRJ 900 operating as flight AC8646 from Montreal, was attempting a routine landing late Sunday night. However, within seconds of touchdown, the situation turned catastrophic. According to early reports, the plane collided with an emergency vehicle that had been dispatched to assist another aircraft on the runway. Eyewitnesses described the moment as chaotic and surreal. One passenger reported feeling intense turbulence before the landing, followed by a rough impact and a loud explosion-like sound. Another witness said it looked like the plane had been “cut in half,” highlighting the severity of the crash. Inside the aircraft, passengers were thrown from their seats as panic spread. Many described hearing screams as the cabin filled with confusion and fear....

TeamViewer steal users’ password

 

TeamViewer port could be exploited to steal users’ password
TeamViewer has a high-risk vulnerability (CVE-2020-13699) could be exploited by remote attackers to steal users’ password, and could lead to further system exploitation.

What's TeamViewer?



TeamViewer is an application and is available for Windows, macOS, Linux, Chrome OS, iOS, Android, Windows RT Windows Phone 8 and BlackBerry operating systems, this application used primarily for remote access to control of various types of computer systems and mobile devices, but also offers many features.

Organizations have recently increased use of this program according to COVID-19 precautions, as many employees are forced to work from home.

What's vulnerability (CVE-2020-13699)?

CVE-2020-13699 is a security bug arising from an unquoted search path or element and could be exploited when the system with a vulnerable version of TeamViewer installed visits a maliciously crafted website.

This allow attacker embed a malicious in URL that would launch the TeamViewer Windows desktop client and force it to open a remote SMB share.

Windows will perform NTLM authentication when opening the SMB share and that request can be relayed.

According to the company, the vulnerability affects TeamViewer versions 8 through 15 (up to 15.8.2) for the Windows platform. Users are advised to upgrade to version 15.8.3 to close the hole.

So, we need to ask ourselves is TeamViewer safe for Remote connection ... and what happened can be classified as a real bug, or something else .... it's discovered with COVID19 and before that what was attackers doing in their hidden world?

you can watch our content about teamviewer

Popular posts from this blog

💰 Dumb Money System Review – Matt Scott Trick EXPOSED! 💰

Emperor penguin in your home

Download GetDataBack Simple for PC full