Windows 7 Meltdown Patch Complications

/
The fundamental nature of the Meltdown exploit is something that makes it incredibly difficult to mitigate. Meltdown was first publicly reported three months ago. Microsoft has worked very hard on patching the vulnerability for all affected currently supported versions of Windows, but the nightmare is far from over ... Read More

Windows 7 Meltdown Patch Complications

/
The fundamental nature of the Meltdown exploit is something that makes it incredibly difficult to mitigate. Meltdown was first publicly reported three months ago. Microsoft has worked very hard on patching the vulnerability for all affected currently supported versions of Windows, but the nightmare is far from over ... Read More

Uncle Sam is Looking for Cybersecurity Professionals

/
Uncle Sam’s 'I Want You for U.S. Army' poster from World War 1 is an iconic piece of Americana. A century has passed since then, and now Uncle Sam isn’t looking to recruit Doughboys, but cybersecurity professionals instead ... Read More

Android Trojans Steal Sensitive Facebook Data

GhostTeam Trojan apps have been in the Google Play Store since at least April 2017. Although Google just recently removed them, 'Download Videos From Facebook' by Music’s Life alone has over 100,000 downloads, so possibly over a million devices have been infiltrated by one of the GhostTeam Trojan apps ... Read More

Android Trojans Steal Sensitive Facebook Data

GhostTeam Trojan apps have been in the Google Play Store since at least April 2017. Although Google just recently removed them, 'Download Videos From Facebook' by Music’s Life alone has over 100,000 downloads, so possibly over a million devices have been infiltrated by one of the GhostTeam Trojan apps ... Read More

Research Project Tracks Websites Affected by Data Breaches

Cyber attackers know that a lot of us reuse passwords. It’s a habit that millions of people engage in because it can be overwhelming to have to remember a unique password for every online service we have. But if one of your passwords is leaked in a data breach, an ... Read More

Many Popular Smart TVs Have Serious Vulnerabilities

/ / security bloggers network
The sale and use of IoT consumer devices has exploded in recent years. According to IHS Markit, 69% of new TVs shipped to retailers in 2017 had Internet capabilities. When those credentials fall into the wrong hands, cyber attackers can ruin people’s digital lives ... Read More

Researcher Discloses Critical macOS Privilege Escalation Bug

/ / security bloggers network
Security researcher Siguza recently discovered a critical macOS vulnerability which affects versions of macOS and OS X from the latest 10.13 High Sierra all the way back to 10.2 Jaguar. Siguza calls it IOHIDeous ... Read More

Email Phishing Has Never Been Easier

Phishing is a type of social engineering attack that involves attackers pretending to be trusted entities using email or websites. Security researcher Sabri Haddouche recently launched Mailsploit, a way to bypass the DMARC email authentication system in order to spoof email addresses in a way that exploits vulnerabilities in most ... Read More

Hospital Had Backups – Paid Ransom Anyway

Hancock Regional Hospital in Indiana recently discovered that their computers had been infected with SamSam ransomware. The hospital made the difficult decision to pay the four Bitcoin ransom ($55,000 USD) in order to get their files decrypted… despite having full backups of all of the data that SamSam encrypted ... Read More
Loading...