Apple has patched the Trident vulnerabilities in OS X and Safari. The flaws were originally disclosed in iOS and used to spy on a UAE human rights activist.
Browsing Category: Uncategorized
A serious vulnerability in the TCP implementation in Linux systems can be used identify hosts communicating over the protocol and attack that traffic.
In this Threatpost op-ed, Dave Dittrich and Katherine Carpenter discuss the imprecision in language surrounding “cyber war” and “cyber weapons,” and explain how this may contribute to bad law and policy.
Libarchive was patched against three memory-related vulnerabilities, putting pressure on admins to ensure third-party software that also uses the library is patched.
Microsoft patched a NetBios Name Spoofing vulnerability on Patch Tuesday that impacts every version of Windows.
More than a year after hackers managed to manipulate the system the Internal Revenue Service has reinstated its Get Transcript service.
Yahoo is forcing a password reset on Tumblr accounts after a cache of email addresses and salted and hashed passwords from 2013 were discovered in the wild.
FBI Director James Comey discussed the scope of the tool they used to break the iPhone 5C and challenged the concept of absolute privacy in a talk Wednesday.
Cisco and the open-source IDS Snort are both vulnerable to malware under specific configurations.
Researcher Troy Hunt explains how his hack of a Nissan Leaf works, and his experience disclosing the issue to the carmaker.