New hardware vulnerability in Intel processors
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
167 articles
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Vulnerabilities found in the Exynos chipset allow Samsung, Vivo and Google smartphones to be remotely hacked if the owner’s phone number is known. How is this possible, and how to protect yourself?
You shouldn’t put off updating to iOS 16.3 and macOS Ventura 13.2 and future updates, and here’s why.
One of the most curious and menacing bugs in Android smartphones, and the problems they had closing it.
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
A year after discovery, the Log4Shell vulnerability is still making itself felt.
We investigate the connection between software security and leaks when handling RAM.
In 2022, cryptocurrency prices fell sharply, but malicious miners are more active than ever.
An interesting bug in one of the most popular embedded DBMS.
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.