Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 29
Researchers have found three Sega game apps that connect to insecure servers and risk leaking user data.
Prolific Google bug hunter Guang Gong earns highest ever Android Security Rewards payout.
Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware .
Enterprise applications from Oracle and others could be becoming juicier targets for attackers.
Researchers at network security vendor ICEBRG recently discovered four malicious extensions in the official Google Chrome Web Store with a combined user count of more than 500,000, and as with past incidents, the implications are serious for both consumers and enterprises. ICEBRG notified Google and three of the extensions have since been removed from the...
A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to launch an authentication bypass attack.
Thanks to Meltdown and Spectre, January has already been an extremely busy month of patching for Microsoft.
Microsoft is pausing the rollout of Windows Meltdown and Spectre patches until hosted anti-virus software vendors confirms no unsupported Windows kernel calls via the addition of a registry key on PCs.
Apple releases patches addressing the Spectre vulnerability impacting its macOS, iPhone, iPad and iPod touch.
Mitigating Spectre and Meltdown flaws won’t be easy, but experts say exploits targeting Spectre will be hard to patch against.
... 252627282930313233 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...