Security News

Researcher Drops Oracle VirtualBox Zero-Day
2018-11-07 10:31

A researcher has disclosed the details of a zero-day vulnerability affecting Oracle’s VirtualBox virtualization software. The flaw appears serious as exploitation can allow a guest-to-host escape....

Researchers Break Full-Disk Encryption of Popular SSDs
2018-11-06 17:14

The encryption mechanism used by several types of solid state drives contains vulnerabilities that an attacker could exploit to access encrypted data without knowing a password. read more

ICS Devices Vulnerable to Side-Channel Attacks: Researcher
2018-11-05 10:35

Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA. read more

China hijacking internet traffic using BGP, claim researchers
2018-10-30 11:28

Researchers claim that unusual BGP routing changes are actually man-in-the-middle surveillance.

Researchers exploit Microsoft Word through embedded video
2018-10-29 12:49

A group of researchers has found a way to infect computers via Word documents without triggering a security warning.

Researchers Find Command Injection Flaw in Cisco WebEx
2018-10-25 14:23

Cisco’s WebEx software is affected by a serious vulnerability that can be exploited to execute arbitrary commands with elevated privileges. read more

Researchers expose security vulnerabilities in terahertz data links
2018-10-17 05:15

A new study shows that terahertz data links, which may play a role in ultra-high-speed wireless data networks of the future, aren’t as immune to eavesdropping as many researchers have assumed. The...

Researchers link Industroyer to NotPetya
2018-10-11 14:21

ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts throughout the country: a...

Researchers KRACK Wi-Fi Again, More Efficiently This Time
2018-10-09 14:51

Researchers who last year discovered read more

When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference?
2018-10-02 23:42

A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it....