Hardened Azure, softened containers, force unlocking iOS 12, 11 iPhones ? and...

23 Jun 2018 at 8:12am
Plus: Our tip on keeping Mac files encrypted

Roundup This week you had to deal with AI security panic, fake Fortnite, and, if you use OpenBSD, the end of Intel HyperThread support?

Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't...

22 Jun 2018 at 10:44pm
How to extract 256-bit signing keys with 99.8% success

Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.?

Schneier warns of 'perfect storm': Tech is becoming autonomous, and security ...

22 Jun 2018 at 9:36am
Tel Aviv treated to Brucey's bonus views

Israel Cyber Week With insecure computers in charge, the healthcare and transportation sectors have become a nexus of security problems, infosec veteran Bruce Schneier warned delegates at Israel Cyber Week.?

more Spam-News

PDF spam – a step ahead of image spam(GFI white paper)


Perl: Schwachstelle ermöglicht Manipulation von Dateien

12 Jun 2018 at 10:00pm
Perl ist eine freie, plattformunabhängige und interpretierte Programmiersprache (Skriptsprache).

Microsoft Windows: Mehrere Schwachstellen

12 Jun 2018 at 10:00pm
Windows ist ein Betriebssystem von Microsoft. Microsoft Windows RT ist eine Version des Windows-Betriebssystems von Microsoft für Geräte basierend auf der ARM-Architektur, wie beispielsweise Tablet-Computer.

Microsoft Outlook: Mehrere Schwachstellen

12 Jun 2018 at 10:00pm
Outlook ist ein Personal Information Manager von Microsoft und ist Bestandteil der Office Suite. Die Microsoft Office Suite beinhaltet zahlreiche Büroanwendungen wie Textverarbeitung, Tabellenkalkulation, Datenbank und weitere Applikationen. Das Microsoft Office Compatibility Pack ermöglicht die ...

more Phishing-News


Modern OSs for embedded systems

by Alexander Shadrin
20 Jun 2018 at 10:00am
At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other words, the internet of things). Our primary interest is how and to what degree these OSs can solve cybersecurity-re...

Olympic Destroyer is still alive

by GReAT
19 Jun 2018 at 10:00am
In May-June 2018 we discovered new spear-phishing documents that closely resembled weaponized documents used by Olympic Destroyer in the past. This and other TTPs led us to believe that we were looking at the same actor again. However, this time the attacker has new targets.

LuckyMouse hits national data center to organize country-level waterholing ca...

by Denis Legezo
13 Jun 2018 at 10:00am
In March 2018 we detected an ongoing campaign targeting a national data center in the Central Asia that we believe has been active since autumn 2017. The choice of target made this campaign especially significant ? it meant the attackers gained access to a wide range of government resources at on...

more Virus-News


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites