Archives: May 2018
You are here: Home \ 2018 \ May \ Page 4
Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative execution side channel flaw that could allow attackers to access information.
A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites.
Records for a mobile app that parents can use to monitor what their kids are doing online has been exposed in the latest Amazon Web Services cloud misconfiguration.
Analysis shows that the malware, previously a banking trojan focused on Android devices, has rapidly evolved just in the past month.
The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.
The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.
A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news.
A recently discovered malware steals cache data and messaging sessions from the desktop version of encrypted messaging service Telegram.
Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.