exploits

Visit/security/34787/genetics-startup-veritas-rocked-by-data-breach
Security

Genetics startup Veritas rocked by data breach

Customer information has been stolen from the DNA-screening company
8 Nov 2019
Visit/security/34773/tenable-declares-there-are-far-worse-security-threats-to-fear-than-zero-day-exploits
Zero-day exploit
Security

Tenable: There are far more dangerous threats than zero-days

‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
7 Nov 2019
Visit/security/34744/first-mass-bluekeep-exploitation-spotted-in-the-wild
Networks connected with each other across the world
Security

First mass BlueKeep exploitation spotted in the wild

Amateurish coin mining attack discovered six months after the critical Microsoft vulnerability was discovered
4 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Advertisement
Visit/security/34708/never-give-humans-the-keys-to-your-kingdom-say-goldman-sachs-security-chiefs
Security

Humans 'unfit' to handle access managment, say Goldman Sachs

Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019
Visit/security/34703/iot-botnets-are-on-the-rise-and-5g-isn-t-helping-anything
Botnet graphic
Security

IoT botnets are on the rise and 5G isn’t helping anything

Botnets are more common and coming in more diverse strains than ever before
29 Oct 2019
Visit/security/34660/hackers-are-no-longer-winning-says-kpmg-cyber-chief
Hacker in the shadows
Security

Hackers 'are no longer winning', says KPMG cyber chief

Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
18 Oct 2019
Visit/security/34485/apple-fast-tracks-ios-131-to-remedy-bug-ridden-upgrade
Security

Apple fast-tracks iOS 13.1 to remedy bug-ridden upgrade

A serious data-leaking keyboard vulnerability, however, will remain unpatched
25 Sep 2019
Visit/security/34424/lastpass-fixes-password-leaking-flaw
The LastPass password manager
Security

LastPass fixes password-leaking flaw

Google’s Project Zero finds a critical hole in the widely-used password manager
17 Sep 2019
Advertisement
Visit/wannacry/34352/what-is-wannacry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
9 Sep 2019
Visit/exploits/30478/what-are-meltdown-and-spectre-and-are-you-affected
exploits

What are Meltdown and Spectre and are you affected?

A guide to the CPU security flaws and their flawed patches
29 Aug 2019
Advertisement
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/cyber-security/34205/microsoft-patches-abundance-of-critical-and-wormable-windows-vulnerabilities
Microsoft's flagship OS Windows 10 on a purple graphic
cyber security

Microsoft patches abundance of Windows vulnerabilities

BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
14 Aug 2019
Visit/security/34201/def-con-developer-sells-200-mac-hacking-iphone-cables
Apple Lightning cable
Security

Def Con developer sells $200 Mac-hacking iPhone cables

They take around four hours to make and only 10-20% were actually good enough to sell
13 Aug 2019
Visit/ransomware/34191/researchers-show-how-easy-it-is-to-inject-a-dslr-camera-with-ransomware
Hacked camera
ransomware

Researchers show how to inject a DSLR with ransomware

Hackers can encrypt a camera using just a Wi-Fi connection, demo shows
12 Aug 2019
Advertisement
Visit/internet-security/34188/firms-urged-to-scan-networks-for-major-big-ip-load-balancer-flaw
Networks connected with each other across the world
internet security

Enterprises urged to scan networks for F5 BIG-IP flaw

Compromised devices are difficult to detect and can act as a springboard for further attacks
9 Aug 2019
Visit/security/34189/decade-old-vulnerability-found-in-globally-popular-office-phone
Security

Decade-old flaw found in globally popular office phone

Avaya's VOIP phones are used by 90% of Fortune 100 companies
9 Aug 2019
Visit/security/34185/security-researchers-now-eligible-for-bug-hunting-iphones
iPhone X with notch
Security

Security researchers now eligible for bug-hunting iPhones

Apple also reveals tenfold increase to its bug-bounty rewards
9 Aug 2019
Visit/security/34156/businesses-urged-to-patch-against-highly-severe-nvidia-flaws
Security

Nvidia urges businesses to upgrade drive after finding flaws

GeForce, Quadro and Tesla GPUs are affected by bugs that could lead to local code execution
6 Aug 2019
Visit/security/34097/exploits-for-windows-bluekeep-vulnerability-commercially-available
Graphic of a cyber criminal or hacker
Security

Working BlueKeep exploits now freely available

The issue has been dubbed 'the next WannaCry' and now attackers can have a copy of their own, for a price
29 Jul 2019
Visit/security/34033/why-the-telecoms-industry-is-particularly-vulnerable-to-bluekeep
Security

The telecoms industry is particularly vulnerable to BlueKeep

The industry's exposure far exceeds any other, but it's not down to incompetence
17 Jul 2019
Advertisement
Visit/exploits/34009/thousands-of-sites-fall-to-magecart-spray-and-pray-attack
binary on a screen with words 'hacking attack'
exploits

Thousands of sites fall to Magecart 'spray and pray' attack

In another case of misconfigured Amazon S3 buckets, attackers will likely make a decent ROI despite low success rate
12 Jul 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019