Article on the subject of "security holes"
-
Origin of the name and logo of Meltdown and Specter - Melting and Ghosts
this article will only answer one question: why are they named so?
-
Intel faces many class action lawsuits because of a chip security error
intel is currently facing at least three class action lawsuits regarding the recent chip security breach.
-
How to protect your computer against Meltdown and Specter security errors
let's tipsmake.com find out the details of the steps to perform computer protection before meltdown and specter security errors in this article!
-
For your safety, turn on the auto-update feature for all your devices and applications
software update is a 'headache' issue. speaking of headaches may seem a bit too much, but actually updating the software gives them no trouble in many situations.
-
Discover new Zero-Day vulnerabilities that target bugs in Windows 10 Task Scheduler
sandboxescaper, a vulnerability researcher named sandboxescaper, recently quietly announced the emergence of a new zero-exploit in windows 10 operating system less than a week after the operating system received it. get regular updates from microsoft.
-
The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotely
watch! if you are constantly using uc browser as the main browser on your smartphone, now is the time to carefully consider uninstalling it immediately.
-
Google: Play Protect helped cut 20% of malicious Android application installations by 2018
to reschedule, google recently officially announced the security & privacy year in review report periodically. basically, this is an overall report that details how mountain view giants have made it more secure for more than 2 billion android devices worldwide.
-
Discover Dragonblood security vulnerability in WPA3
security researchers have recently discovered several new security flaws in the wpa3-personal protocol, allowing potential attackers to unlock wi-fi network passwords.
-
Google urged Chrome users to update the new version immediately to fix the vulnerability
immediately after reading this article, you must remember to update your google chrome immediately to the latest version!
-
Google has reported a zero-day vulnerability that has just appeared in Windows 7, Microsoft has not yet released a patch
according to google's disclosure in a blog post on march 7, 2019, microsoft seems to be having a problem with a zero-day vulnerability in windows 7 that has yet to release a thorough patch.
-
Windows 10 KB4482887 update is officially released with Specter patch
microsoft finally released a windows 10 kb4482887 bug fix update for the 1809 build, including patches for known bugs, including retpoline specter, an action center error and many other minor bugs.
-
Malware and user security bugs are found in top free VPN applications
for every five applications listed in the top 150 free android vpn apps on google's play store, one is flagged as a potential source of malware.
-
Bkav released a free detection tool for Meltdown and Specter
bkav has released a free tool that checks whether the browser and the user's computer are also suffering from specter and meldown errors.
-
New dangerous security vulnerabilities appear on iOS 11.2.6, can read messages without unlocking
the macmagazine page found a vulnerability in ios that makes siri easily read the message content without unlocking it.
-
DNS error allows to hack millions of PCs on all Blizzard games
a google researcher discovered a security flaw on the blizzard update agent available on all of its games.
-
There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
the fingerprint manager pro program of microsoft windows 7, 8 and 8.1 allows users to store data, log in personal accounts on websites, log in to a lenovo computer via fingerprint there are many vulnerabilities that may allow hackers to access user sensitive data.
-
Serious security vulnerability on Intel chips
either leave the hole or install the patch to make it slower. how to choose it depends on you.
-
Google: Dangerous for users when Microsoft does not patch Windows the same way on the OS
google's leading security team, project zero, said that microsoft is putting users at risk when there is no uniformity when patching the windows operating system versions.
-
DUHK attacks allow hackers to obtain encryption keys for VPN and web browsing sessions
duhk - dont use hard-coded keys - is a new dangerous encryption executable vulnerability that allows an attacker to recover the encryption key used to secure vpn connections and web sessions.
-
Tor opens the Bug Bounty program to find a bug to receive a bonus
as cyber attacks and data leaks are increasing, many businesses and organizations have started the bug bounty program to encourage hackers, bug researchers and researchers to find and report bugs. to receive the prize.
-
Detect 2 serious security holes in the Zoom application
recently, cisco talos security researchers have discovered two serious security holes in the zoom application. these vulnerabilities allow hackers to attack and infiltrate the computers of people in the group chat.
-
Internet Explorer has vulnerabilities, unused users are still hacked
recently, security researcher john page has discovered a new security vulnerability in this outdated web browser that allows hackers to steal user data.
-
AMD patched a series of security holes in the graphics driver for Windows 10
amd has just patched a series of security holes in their graphics driver for windows 10 devices. these vulnerabilities allow hackers to perform privilege escalation attacks or execute arbitrary code on the victim's machine. .
-
Detecting a series of vulnerabilities can help hackers disable metal detectors at airports
researchers have discovered a series of security vulnerabilities in a network component of garrett metal detectors.
-
Top 30 serious security holes are being exploited by hackers the most
recently, the cybersecurity agencies of australia, the uk and the us have issued a joint report detailing the most exploited vulnerabilities in 2020 and 2021.
-
Take a look at the most significant threats from the security world in 2019
2019 continues to be a volatile year for global security circles. many new and modern security methods are introduced, but along with it is the continuous progress from malicious agents.
-
Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
rarlab, the developer of winrar, has just released an urgent update to patch a dangerous vulnerability in their software.
-
Microsoft silently updated Windows 10 to patch 2 serious security holes
according to microsoft, the two newly patched security holes affect hundreds of millions of regular windows 10 users and even windows 10 server.
-
Detecting security holes that cause a series of D-Link VPN routers to be remotely attacked
three new security holes in d-link's vpn router have just been discovered by security firm digital defense.
-
10 interesting facts about black holes in the universe (Part 1)
although we have known black holes for a long time, what we know about them is only scientific theory. black holes have a lot of mysteries that we don't know yet, can't explain.
-
New security vulnerabilities on iOS 12.1 allow access to contacts and phone calls
a youtuber named jose rodrigue discovered a serious security flaw of ios 12.1 update, allowing to bypass the lock screen of all iphones without the need for a password, face id or fingerprint.
-
Microsoft introduced a tool to fix security holes in IE 9 and 10
microsoft has released an official security warning regarding zero-day vulnerabilities in ie10 last week and said ie 9 is also vulnerable.
-
Critical RCE vulnerability affects 29 DrayTek router models
researchers from security firm trellix have discovered an unauthenticated remote code execution (rce) vulnerability affecting 29 models of draytek routers.
-
Many serious security holes are found in GitLab
in the last week, gitlab has released a variety of unusual updates to thoroughly address some of the key security holes found on the platform.
-
Detect security holes in both AMD's Ryzen and Threadripper chips
most noteworthy is that intel is a partial sponsor of the security vulnerability research project on amd chips.
-
Found 37 security holes in VNC on Linux, Windows
the researchers found a total of 37 security holes affecting four open source virtual network computing (vnc) deployment solutions.
-
Many Netgear router models contain serious RCE security holes
if you are using one of the following netgear router models, you should immediately update to the latest firmware.
-
Warning: Jenkins exists a serious security hole that helps hackers gain control of computers of many Vietnamese businesses
last night, september 18, vsec - vietnam cyber security joint stock company issued an emergency warning about a serious security hole in the open source application jenkins.
-
The security flaw threatens more than 2 billion Google Chrome users
just released three weeks ago, chrome 81 version contained two dangerous security holes that allowed hackers to attack and control the entire computer system of the victim.
-
New version of Firefox patched some additional security flaws
mozilla has just made a second fix for firefox 16 after the technology industry discovered a series of security holes on this version on the official release date.