Security News

Home devices are so poorly guarded, attackers don't even need sophisticated tools While netizens and journalists worry about criminals and spies using sophisticated cyber-weapons to hijack...

Home devices are so poorly guarded, attackers don't even need sophisticated tools While netizens and journalists worry about criminals and spies using sophisticated cyber-weapons to hijack...

A recently discovered variant of the Mirai Internet of Things (IoT) malware uses a total of 26 different exploits for the infection phase, Akamai reports. read more

An Office bug that was squashed back in 2017 is still in widespread use - make sure your computer hasn't slipped through the patch cracks!

Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users’ inboxes, Microsoft researchers have...

Cequence Security, a provider of innovative application security solutions for today’s hyper-connected enterprises, announced it has expanded the capabilities of its Application Security Platform...

Meanwhile, NSA Issues Alert Stressing Urgency of PatchingA security researcher has posted a demonstration showing how an attacker could exploit the BlueKeep vulnerability to take over a Windows...

For almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as "Robbinhood." Media publications have cited sources...

Google Project Zero researcher unearths a bug in Microsoft’s Notepad Windows application.

Bypassing macOS’ Gatekeeper by leveraging trust in network shares is a trivial operation, a security researcher has discovered. read more