Home
Solutions
News
About Us
Contacts
Blog:
In The News
You are here:
Home
\
Blog
Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads
16 February 2018 - 18:44, by , in
News
,
No comments
Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters.
Read More
Intel Expands Bug Bounty Program Post-Spectre and Meltdown
15 February 2018 - 21:09, by , in
News
,
No comments
Intel will pay up to $250,000 to researchers who identify bugs more severe than 9.0 on the CVSS scale.
Read More
Reported Critical Vulnerabilities In Microsoft Software On the Rise
15 February 2018 - 16:39, by , in
News
,
No comments
Avecto researchers say removing admin rights from users would mitigate many of the threats.
Read More
Word-based Malware Attack Doesn’t Use Macros
15 February 2018 - 16:31, by , in
News
,
No comments
Malicious e-mail attachments used in this campaign don’t display any warnings when opened and silently install malware.
Read More
Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems
14 February 2018 - 21:22, by , in
News
,
No comments
Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems.
Read More
Researchers Find New Twists In ‘Olympic Destroyer’ Malware
14 February 2018 - 18:42, by , in
News
,
No comments
Researchers now believe attackers may have had prior access to networks and that malware was more sophisticated than originally believed.
Read More
Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update
13 February 2018 - 21:01, by , in
News
,
No comments
One of the bugs could allow a successful attack simply by a user viewing an email in Outlook’s Preview pane.
Read More
Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram
13 February 2018 - 18:36, by , in
News
,
No comments
It’s just the latest reported vulnerability for the secure messaging application.
Read More
‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Say
12 February 2018 - 21:53, by , in
News
,
No comments
The malware’s sole purpose was to take down systems, not steal data, Cisco Talos researchers say.
Read More
Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine’s Day
12 February 2018 - 16:58, by , in
News
,
No comments
Emails try to get recipients to share revealing photos of themselves so scammers can later extort them later.
Read More
Prev
...
51
52
53
54
55
56
57
58
59
...
63
...
72
...
81
...
90
...
99
...
108
...
117
...
126
...
135
...
144
...
153
...
162
...
171
...
180
...
189
...
198
...
207
...
216
...
225
...
234
...
243
...
252
...
261
...
Next
Recent Posts
MagentoCore Card Skimmer Found on Mass Numbers of E-Commerce Sites
Threatpost News Wrap Podcast For Aug. 31
Bucking the Norm, Mozilla to Block Tracking Cookies in Firefox
ThreatList: Security Pros Confident They Could Compromise Their Own Orgs
New Threat Actor ‘Rocke’: A Rising Monero Cryptomining Menace
Archives
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
Categories
Data loss
Featured
Law & order
Malware
News
Security threats
Uncategorized
Vulnerabilities
Tags
Adobe
Android
Apple
APT
Black Hat
bug bounty
Cisco
Cloud Security
critical infrastructure
Cryptography
data breach
Data Breaches
DDoS
Encryption
Facebook
FBI
Featured
Firefox
Google
Government
Hacks
https
Internet of things
ios
iot
IoT security
Kaspersky Lab
Linux
Malware
Microsoft
Mobile Security
NSA
patch tuesday
Phishing
Podcasts
Privacy
ransomware
remote code execution
Security Analyst Summit
Uncategorized
Vulnerabilities
Vulnerability
WannaCry
Web Security
Windows