Apple’s ‘Text Bomb’ bug
Apple is rushing to fix a another ‘Text Bomb’ bug that crashes a number of iOS and Mac apps.
Apple’s ‘Text Bomb’ bug Read More »
Apple is rushing to fix a another ‘Text Bomb’ bug that crashes a number of iOS and Mac apps.
Apple’s ‘Text Bomb’ bug Read More »
Security researchers from Trend Micro have spotted two vulnerabilities that are being exploited on popular CouchDB open source database management systems.
Apache CouchDB vulnerabilities exploited Read More »
The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified Trojan malware variants, HARDRAIN and BADCALL, used by the North Korean government.
HARDRAIN and BADCALL malware Read More »
Microsoft issued February 2018 Security Updates that includes more than 50 fixes, 14 of them critical. The updates address multiple Microsoft products to include Windows, Internet Explorer, Edge, Office, Office Services and Web Apps, ChakraCore and Adobe Flash.
Microsoft February 2018 Patch Updates Read More »
Trend Micro researchers detected a new variant of Android Remote Access Tool (AndroRAT) that targets an older publicly disclosed vulnerability (CVE-2015-1805) that allows an attacker to compromise older Android devices to perform privilege escalation.
AndroRAT exploits older Android vulnerability Read More »
Lenovo warned its customers about two critical Broadcom WiFi vulnerabilities that affect 25 ThinkPad models. The firmware vulnerabilities impact Broadcom’s BCM4356 Wireless LAN Driver for Windows 10 and contain buffer overflow flaws.
Lenovo warns of critical WiFi vulnerabilities Read More »
Trend Micro researchers discovered attackers are exploiting a previously patched Windows vulnerability (CVE-2017-11882) by abusing the Windows Installer service, msiexec.exe, to deliver LokiBot malware.
Attack abuses Windows Installer service to deliver LokiBot Read More »
Someone has posted to GitHub the purported source code for a critical component for iPhone’s bootloader or “iBoot.” Access to iBoot code could allow hackers to find vulnerabilities in iOS that could be exploited in the future. iBoot is responsible for ensuring the trusted boot of the mobile operating system, in a sense like iPhone’s BIOS.
Apple’s iPhone ‘iBoot’ source code leak Read More »
Adobe has released security updates that fix critical vulnerabilities, to include one zero-day bug, in its Flash Player for Windows, Macintosh, Linux and Chrome OS.
Adobe patches Flash 0-day (CVE-2018-4878) Read More »
Another crypto-miner is on the loose. The new strain of malware dubbed “ADB.Miner” is spreading rapidly across Android devices with objective to infect and mine Monero cryptocurrency.
ADB.Miner worm spreads rapidly Read More »