| Security Research News |
| Showing 'Security Research News' from 71 to 80|
| |Send In The Clones: Facebook Cloning Revisited As another confusing message spreads, we look at Facebook privacy, cloning, and hacking
The post Send in the clones: Facebook cloning revisited appeared first on WeLiveSecurity
| |Patch Tuesday, October 2018 Edition Microsoft this week released software updates to fix roughly 50 security problems with various versions of its Windows operating system and related software, including one flaw that is already being exploited and another for which exploit...
| |California Outlaws Poor Default Passwords In Connected Devices The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
The post California outlaws poor default passwords in connected devices appeared...
| |Google+ To Shut Down Due To Lack Of Adoption And Privacy Bug Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API
The post Google+ to shut down due to lack of adoption and privacy bug appeared first on WeLiveSecurity
| |October Patch Tuesday: Microsoft Repairs JET Database Engine Bug, Win32K EoP Zero-Day This month’s Patch Tuesday fixes a JET Database Engine Vulnerability (CVE-2018-8423) that Trend Micro’s Zero Day Initiative (ZDI) disclosed last September together with a proof of concept code.
The post October Patch Tuesday: Microsoft...
| |Naming & Shaming Web Polluters: Xiongmai What do we do with a company that regularly pumps metric tons of virtual toxic sludge onto the Internet and yet refuses to clean up their act? If ever there were a technology giant that deserved to be named and shamed for polluting the...
| |Phishing Campaign Uses Hijacked Emails To Deliver URSNIF By Replying To Ongoing Threads A spam campaign we observed in September indicates attackers are angling towards a more sophisticated form of phishing. The campaign uses hijacked email accounts to deliver URSNIF as part of or as a response to an existing email thread.
| |Blockchain: What Is It, How It Works And How It Is Being Used In The Market A closer look at the technology that is rapidly growing in popularity
The post Blockchain: What is it, how it works and how it is being used in the market appeared first on WeLiveSecurity
| |Most Routers Full Of Firmware Flaws That Leave Users At Risk If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats
The post Most routers full of firmware flaws that leave users at risk appeared first on WeLiveSecurity
| |2018 Flare-On Challenge Solutions We are pleased to announce the conclusion of the fifth annualFlare-On Challenge. The numbers are in and we can safely say that thiswas by far the most difficult challenge we’ve ever hosted. We plan toreduce the difficulty next year, so...
| « Newer 3 4 5 6 7 8 9 10 11 12 Older » |