Vladimir Dashchenko, security evangelist at Kaspersky, weighs up IoT cybersecurity, its challenges and if IoT can ever be secure. The …
BeyondTrust releases 2022 Microsoft Vulnerabilities Report – Elevated Privilege #1 vulnerability for second year running
BeyondTrust releases 2022 Microsoft Vulnerabilities Report – Elevated Privilege #1 vulnerability for second year running.
Help AG launches new service and division
With the addition of these services, Help AG strengthens its position
TOR Project: Stop using Windows, disable JavaScript
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
SIM cards vulnerable to hacking, says researcher
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.
New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
Dropbox, WordPress used in cyber-espionage campaign
The Chinese cyber-spies behind the widely publicised espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks.
Researchers find another Android attack that can get past signature checks
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Largest ever DDoS attack directed at financial firm, Prolexic reports
DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic …
For security’s sake, upgrade to a newer version of Office
You probably should upgrade before next April. After that month, Microsoft will no longer provide security updates for Office 2003 …