Vulnerabilities & Exploits
- August 29, 2015Car hacks are no longer science fiction, it’s now reality. And it holds a stark future for us if it’s not addressed and fast.
- August 26, 2015Major software and OS vulnerabilities and the prevalence of adware and potentially unwanted apps make up the most notable stories of the mobile threat landscape over the first half of 2015.
- August 20, 2015A primer on the advantages of implementing virtual patching to protect systems against unpatched vulnerabilities.
- August 18, 2015Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.
- August 13, 2015From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year—and what to expect for the second half of 2015.
- August 11, 2015Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
- July 31, 2015Another Android vulnerability has been found in the system's mediaserver component. This flaw involves its inability to properly handle a malformed MP4 file, which leads to a bug that could be exploited.
- July 29, 2015Researchers recently uncovered a critical security flaw that threatens to expose almost a billion users to what's being considered as “one of the worst Android vulnerabilities discovered“.
- July 21, 2015A lot has happened since the surveillance software company Hacking Team got hacked last week. Here's a quick rundown of updates on the zero-day vulnerabilities that was found following the HT data dump.