Jump to content
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble

Rss Bot

Members
  • Content Count

    19,176
  • Joined

  • Last visited

    Never
  • Feedback

    N/A

Everything posted by Rss Bot

  1. The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world. View the full article
  2. The vendor also issued a patch schedule for the still-unpatched bug in its Secure Boot trusted hardware environment, which affects most of its enterprise and SMB portfolio, amounting to millions of vulnerable devices. View the full article
  3. Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols. View the full article
  4. Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week. View the full article
  5. You're reading 2 Ways to Add Interactive Hotspots to Postcards Email Templates, originally posted on Designmodo. If you've enjoyed this post, be sure to follow on Twitter, Facebook! Adding an interactive hotspot to your email’s image is a wonderful idea. It can significantly improve clickthrough conversions if your subscribers can click on the items you’re referring to in your copy. Additionally, these interactive hotspots can be an innovative … View the full article
  6. Microsoft Patch Tuesday security bulletin tackles 22 critical vulnerabilities. View the full article
  7. A massive update addresses the breadth of the computing giant's product portfolio. View the full article
  8. Intel has disclosed a new class of speculative execution side channel attacks. View the full article
  9. Adobe has issued patches for 87 vulnerabilities on Patch Tuesday - the bulk of which exist in Adobe's Acrobat and Reader product. View the full article
  10. The bug is remotely exploitable without authentication or user interaction. View the full article
  11. WhatsApp has patched a vulnerability that allowed attackers to install spyware on victims' phones. View the full article
  12. The two high-severity bugs impact a wide array of enterprise, military and government networks. View the full article
  13. A Twitter glitch "inadvertently" leaked iOS users' location data to an unnamed partner. View the full article
  14. In its latest observed campaign, there were also overlaps in victimology with the DarkHotel APT. View the full article
  15. Using a bug patched in March, the attacks are starting to ramp up worldwide. View the full article
  16. From a creepy Airbnb incident to Verizon's Data Breach Investigations Report, Threatpost editors break down the top privacy and security stories for the week ended May 10. View the full article
  17. The WannaCry attack proved pivotal, changing the way organizations go about securing their environments. View the full article
  18. Nvidia has patched three vulnerabilities in its Windows GPU display driver that could enable information disclosure, denial of service and privilege escalation. View the full article
  19. Nigerian scam groups launched even more attacks in 2018 - and used more complex types of malware to reach more victims. View the full article
  20. A video interview and Q&A with IoT specialist Dan Demeter of Kaspersky Lab. View the full article
  21. Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password. View the full article
  22. The Android security update patches 15 bugs, four rated critical, 10 rated high and one ranked moderate in severity. View the full article
  23. A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls. View the full article
  24. Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices. View the full article
×