Two severe vulnerabilities found in Intel’s hardware
Credit to Author: Jornt van der Wiel| Date: Thu, 04 Jan 2018 10:35:01 +0000
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Jornt van der Wiel| Date: Thu, 04 Jan 2018 10:35:01 +0000
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
Read MoreCredit to Author: Pradeep Kulkarni| Date: Fri, 24 Nov 2017 07:21:16 +0000
Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a change in this trend. Seems like the rise observed in cryptocurrency valuations especially for Bitcoins is making attackers to go after cryptocurrency mining. Cryptocurrency miner malware have become hot attack vectors for…
The post Massive campaign delivering Monero Miner via compromised websites – an analysis by Quick Heal Security Labs appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.
Read MoreCredit to Author: Lorenzo Franceschi-Bicchierai| Date: Mon, 30 Oct 2017 15:00:00 +0000
A series of bugs allowed hackers to snoop into one of Google’s most sensitive internal systems.
Read MoreCredit to Author: Lorenzo Franceschi-Bicchierai| Date: Tue, 12 Sep 2017 13:00:00 +0000
Security researchers reveal several new bugs that allowed hackers to hack into cellphones and computers simply because they had Bluetooth on.
Read MoreCredit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 03:32:04 +0000
Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the opposite of this process in the digital underground. Cybercriminals often sell exploits and malicious tools for profit. The ShadowBrokers—infamous for the leak of…
Credit to Author: Roman Unuchek| Date: Wed, 21 Jun 2017 13:00:03 +0000
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Read MoreCredit to Author: Dmitry Zveginets| Date: Wed, 17 May 2017 17:12:37 +0000
Embedded systems demand special protection from infections similar to WannaCry.
Read MoreCredit to Author: Lily Hay Newman| Date: Tue, 16 May 2017 11:30:54 +0000
The harder part will be determining when certain vulnerabilities, like WannaCry, are too big to keep secret. The post Why Governments Won’t Let Go of Secret Software Bugs appeared first on WIRED.
Read More