Security News

A piece of crypto-mining malware is using sophisticated tools for its operations, including a Windows exploit linked to the National Security Agency, security researchers warn. read more

2017 was the year of high profile data breaches and ransomware attacks, but from the beginning of this year, we are noticing a faster-paced shift in the cyber threat landscape, as...

AMD’s new Zen 2 and future processors will include protections against Spectre and other similar exploits, the tech giant revealed on Tuesday as it announced its earnings for 2017. read more

Prolific Google bug hunter Guang Gong earns highest ever Android Security Rewards payout.

Cybercriminals and nation state groups were quick to adopt the most effective exploits last year, a new AlienVault report reveals. read more

Physical Access Plus Default AMT Credentials Equals Takeover, F-Secure WarnsAn attacker who gains physical access to a corporate PC with an Intel chip could exploit the built-in Active Management...

Intel has been working with its partners to release software and firmware updates that should protect systems against the recently disclosed CPU attacks. The company expects patches to become...

Security experts believe hackers will soon start to remotely exploit the recently disclosed vulnerabilities affecting Intel, AMD and ARM processors, if they haven’t done so already. read more

Ad targeters are exploiting browsers’ built-in login managers to covertly collect hashes of users’ email addresses, to be used to track them across the web. “Email addresses are unique and...

A researcher with the Twitter handle ‘Siguza’ published details of a macOS local privilege escalation vulnerability dating back to 2002 that could give an attacker root access to systems.